Veracrypt project update

Microsoft driver-signing account suspension

  • VeraCrypt’s Windows driver-signing account was terminated, blocking new signed Windows releases (especially kernel drivers and bootloader).
  • Similar issues reported by other major open‑source projects (e.g., VPN software, office suite), sometimes with 60‑day “appeal” windows and no human contact.
  • Later, a Microsoft executive publicly framed this as missed/failed identity verification and promised to get affected projects unblocked, calling it “paperwork” rather than conspiracy.
    • Many commenters see this as still unacceptable: opaque, fragile, and dangerous for critical security software.

Impact on users and maintainers

  • Existing signed releases continue to install; signatures aren’t retroactively invalidated, but they won’t receive security updates.
  • For unsigned/new drivers, users must disable driver signature enforcement / Secure Boot, which now triggers intrusive “Test Mode” watermarks.
  • Devs depending on Microsoft’s ecosystem (Store, driver signing, GitHub) feel they operate under constant risk of arbitrary lockout.

Critique of centralized signing and app‑store control

  • Strong concern that OS vendors and a shrinking set of CAs function as de‑facto gatekeepers for software distribution, especially for kernel‑level code.
  • Many argue the current code‑signing model mainly burdens honest developers and users while attackers obtain leaked or abused certificates anyway.
  • Several note that automated abuse/scam detection plus no‑appeal policies have become a systemic problem across big platforms.

Alternatives, workarounds, and developer experience

  • Suggestions:
    • Avoid Microsoft Store; use independent code‑signing certs and distribute installers directly.
    • Obtain HSM‑backed individual code‑signing certs from non‑Microsoft CAs; experiences vary from “annoying but doable” to “effectively iced out.”
    • Move users off Windows entirely; run Windows in a VM on Linux if necessary.
  • Some point to technical hacks (e.g., loading via older vulnerable signed drivers), but these are seen as undesirable.

Security, trust, and regulation debates

  • Split between “incompetence and bad processes” vs “intentional pressure on strong encryption and VPN tools,” with several raising state‑influence concerns.
  • Many call for regulation treating major platforms and app stores like utilities with due‑process requirements and human appeal paths.
  • Others argue deeper fixes require open OSes (Linux/BSD), better sandboxing/VM isolation models, and possibly decentralized / web‑of‑trust style signing.