Changes between 1.24-Update6 and 1.24-Update7 (7 August 2020) :

  - All OSes:
     * Don't allow Hidden volume to have the same password, PIM and keyfiles as Outer volume
     * Fix random crash in 32-bit builds when using Streebog.
     * Enable FIPS mode in JitterEntropy random generator.
     * Update Beginner's Tutorial in documentation to use "MyVolume.hc" instead of "My Volume" for file container name in order to avoid confusion about nature of file nature.
     * Minor code cleanup

  - Windows:
     * Fix wrong results in benchmark of encryption algorithms when RAM encryption is enabled
     * Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected.
     * Fix UI for blocking TRIM in system encryption not working in MBR boot mode.
     * Support password drag-n-drop from external applications (e.g. KeePass) to password UI fields which is more secure than using clipboard.
     * Implements compatibility with Windows 10 Modern Standby and Windows 8.1 Connected Standby power model. This makes detection of entring power saving mode more reliable.
     * Avoid displaying waiting dialog when /silent specified for "VeraCrypt Format" during creating of file container using /create switch and a filesystem other than FAT.
     * Use native Windows format program to perform formatting of volume since it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.
     * Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
     * Don't allow to encrypt the system drive if it is already encrypted by BitLocker.
     * Implement detection of Hibernate and Fast Startup and disable them if RAM encryption is activated.
     * Warn about Fast Startup if it is enabled during VeraCrypt installation/upgrade, when starting system encryption or when creating a volume, and propose to disable it.
     * Add UI options to control the behavior of automatic bootloader fixing when System Encryption used.
     * Don't allow a directory path to be entered for the file container to be created in Format wizard.
     * Don't try to use fix for CVE-2019-19501 if Windows Shell has been modified or is not running since there is no reliable way to fix it in such non standard configuation.
     * MBR bootloader: fix incorrect compressed data size passed to decompressor in boot sector.
     * Add warning message when typed password reaches maximum length during the system encryption wizard.
     * Fix wrong error message when UTF-8 encoding of entered password exceeds the maximum supported length.
     * Update libzip to latest version 1.7.3.
     * Update translations.

  - Linux/MacOSX:
     * Force reading of at least 32 bytes from /dev/random before allowing it to fail gracefully
     * Allow choosing a filesystem other than FAT for Outer volume but display warning about risks of such choice. Implement an estimation of maximum possible size of hidden volume in this case.
     * Erase sensitive memory explicitly instead of relying on the compiler not optimizing calls to method Memory::Erase.
     * Add support for Btrfs filesystem when creating volumes (Linux Only).
     * Update wxWidgets for static builds to version 3.0.5.


