Sep 29, 2015 at 7:16 PM
Edited Sep 29, 2015 at 7:30 PM
For one, if I'm only upgrading for the local security vulnerabilities. Aren't there likely at least a few dozen other Windows or driver vulnerabilities that would allow an attacker to get administrator from an unprivileged account? Isn't trying to fix
local security in Windows like trying to plug swiss cheese?
When I see stuff like this in the changelog I start to get worried, REAL worried:
1.13 (August 9th, 2015):
Solve TOR crashing when run from a VeraCrypt volume.
How does this even happen? What about all the other applications and games that I play? What if Veracrypt breaks them? Also reading about people having crashes when dismounting volumes and etc.
Someone try to convince me otherwise, but I think I'm just going to keep truecrypt and hope maybe someone releases a truecrypt with only those vulnerabilities patched as the encryption seems "good enough".
Plus I'm running an encrypted system drive which I assume I'll have to decrypt and re-encrypt with veracrypt. The fact they had to add truecrypt container support later also makes me wonder how much this is really based off of truecrypt and what all they changed.
Seems strange that something based on truecrypt can't even mount truecrypt volumes until later releases, and also I'm assuming still no support for truecrypt system volumes.