VeraCrypt 1.25.7 update reintroduces support for Windows Vista, 7 and 8 systems
The latest version of open source encryption software VeraCrypt brings back support for Windows Vista, Windows 7 and Windows 8 operating systems.
The developers of VeraCrypt released VeraCrypt 1.25.4 in December 2021. One of the version changes was the removal of support for Windows Vista, Windows 7, and Windows 8 / 8.1. The reason for the deletion was that the new requirements for driver code signing forced the development team to drop support for these versions of Windows.
Point: Here is how to fix VeraCrypt automatic repair problem on Windows.
Windows Vista is no longer supported by Microsoft. Windows 7 is in its third year of Extended Security Releases, and Windows 8.1 is still in Extended Support. The official end of support date for Windows 8.1 is January 10, 2023. Windows 7 and 8.1 will no longer be supported around the same time.
VeraCrypt 1.25.7 restores support for Windows Vista, Windows 7, and Windows 8.1. The team notes that there are some fixes that need to be installed on Windows 7 and Vista devices in order for the latest version of VeraCrypt to be installed on those devices.
Windows 7 support requires installation of KB3033929 or KB4474419.
- KB3033929 is a security update released by Microsoft on September 3, 2015.
- KB4474419 is the update for SHA-2 code signing support.
Windows Vista support requires installation of KB4039648 or KB4474419.
Once these patches are installed, VeraCrypt 1.25.7 installs correctly on all three versions of the operating system.
The new version introduces another useful option specific to Windows machines. Three registry options have been added which can be used to tune performance “for SSD drives and have better stability under heavy load”.
Here’s what the three registry values ââare for and how you set them:
- Open Registry Editor by selecting Start, typing regedit.exe, and loading the result.
- Navigate to HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services veracrypt.
- Create the DWORDs with right clicking on veracrypt and selecting New> Dword Value (32 bit)) from the context menu.
The VeraCryptEncryptionFragmentSize DWORD defines the size of the encryption date fragment in KiB. The default is 256, it can be increased to a value of 2048.
The VeraCryptEncryptionIoRequestCount DWORD defines the maximum number of parallel I / O requests. The default is 16, it can be increased to a value of 8192.
The VeraCryptEncryptionItemCount DWORD defines the maximum number of encryption queue items processed in parallel. Its default and maximum value are half of the value of VeraCryptEncryptionIoRequestCount.
The developers suggest changing the values ââto 512 (VeraCryptEncryptionFragmentSize), 128 (VeraCryptEncryptionIoRequestCount), and 64 (VeraCryptEncryptionItemCount) respectively, as this improves “sequential read speed on some NVMe SSD systems”.
VeraCrypt users who run SSDs, especially NVMe drives, may need to experiment with the options to find the best values ââfor their systems and use cases.
Now you: do you encrypt your systems? (Going through desktop modder)