Forgot your password?
typodupeerror
Encryption Microsoft Windows

Microsoft Abruptly Terminates VeraCrypt Account, Halting Windows Updates (404media.co) 98

Microsoft has apparently terminated the account VeraCrypt uses to sign its Windows drivers and bootloader, leaving the encryption project unable to publish Windows updates and throwing future releases into doubt. VeraCrypt's developer says Microsoft gave no clear explanation or warning for the move. "I didn't receive any emails from Microsoft nor any prior warnings," Mounir Idrassi, VeraCrypt's developer, told 404 Media. From the report: VeraCrypt is an open-source tool for encrypting data at rest. Users can create encrypted partitions on their drives, or make individual encrypted volumes to store their files in. Like its predecessor TrueCrypt, which VeraCrypt is based on, it also lets users create a second, innocuous looking volume if they are compelled to hand over their credentials. Last week, Idrassi took to the SourceForge forums to explain why he had been absent for a few months. The most serious challenge, he wrote, "is that Microsoft terminated the account I have used for years to sign Windows drivers and the bootloader."

"Regarding VeraCrypt, I cannot publish Windows updates. Linux and macOS updates can still be done but Windows is the platform used by the majority of users and so the inability to deliver Windows releases is a major blow to the project," he continued. "Currently I'm out of options." Idrassi told 404 Media the termination happened in mid-January. "I was surprised to discover that I could no longer use my account," he said.

On the forum and in the email to 404 Media, Idrassi shared what he said was the only message he received connected to the account shutdown. "Based on the information you have provided to date, we have determined that your organization does not currently meet the requirements to pass verification. There are no appeals available, we have closed your application," it reads. Idrassi told 404 Media the message is concerning his company IDRIX. "As you can read in their message, they say that the organization (IDRIX) doesn't meet their requirements, but I don't see which requirement IDRIX suddenly stopped meeting," he said. Idrassi said he has tried contacting Microsoft support, but he received automated responses that he believes contained AI-generated text.

Microsoft Abruptly Terminates VeraCrypt Account, Halting Windows Updates

Comments Filter:
  • by innocent_white_lamb ( 151825 ) on Wednesday April 08, 2026 @01:24PM (#66083530)

    Microsoft issues the secure boot keys that are used by all Linux distributions.

    If they can just arbitrarily yank someone's keys like this, apparently without explanation or appeal, then what does that mean for those Linux keys? Are they subject to withdrawal for no reason as well?

    • by Valgrus Thunderaxe ( 8769977 ) on Wednesday April 08, 2026 @01:27PM (#66083546)
      Disable secure boot and carry on as usual. Why are you using this in the first place?
      • Why are you using this in the first place?

        Because my employer requires me to use Secure Boot, and sends me nasty-grams if I leave it turned off. It's called a company-managed platform.

        • Do you often use VeraCrypt on a company-managed device? I'm sure if you do then it's with the knowledge and consent of your IT department and they'll be responsible for managing any consequences of the VeraCrypt issue according to their official policy as well.

        • by kriston ( 7886 )

          VeraCrypt on a company-managed platform?

          That's just wrong. In that use case, it's only Microsoft BitLocker.

      • That works... for now. However, IIRC, the first rev of ARM PCs had no ability to disable Secure Boot, and we may find BIOSes in the future which won't have that option, for sake of economy.

        Then, there is scale. If one has a ton of Linux machines, be it workstations to servers, having to go in manually to turn off Secure UEFI, or enroll custom boot keys can get tedious.

      • Exactly... how many people have access to your computer and can tear the harddrive out? Whoopie... I can't pull your HDD and boot it on my machine... I can still put it in a drive dock and download your files, unless you use "encryption" (which can be broken in tons of ways).

        Remember, no encryption is totally secure... I somehow doubt that Whatsapp would let you discuss an act of terrorism without some state agency having the key to that encryption, same with any other "secure" thing... and, it's pretty co

      • That's why I leave my password fields blank. It's so much easier to ignore security. (Also no Microsoft has no capability of preventing you booting Linux or using Linux with secure boot disabled, the only thing they have the ability to block is you booting Linux using Window's boot loader).

    • by dskoll ( 99328 ) on Wednesday April 08, 2026 @01:28PM (#66083550) Homepage

      Basically: Yes. I suspect the US government was behind this stunt, but absolutely... if the US government decides it doesn't want foreign companies to have easy access to non-Microsoft, non-Apple OSes, I can see them pulling this stunt.

      The only solution is to ensure that whatever hardware you buy lets you either disable secure boot or install your own trusted key.

    • Microsoft issues the secure boot keys that are used by all Linux distributions.

      This is separate from secure boot. In Windows kernel drivers are required to be signed. The trust anchors from what I remember are hard coded into the operating system. You can't even add certs for drivers to the systems store.

      This can only be bypassed by booting with driver signature enforcement disabled. Having users do that is not all that feasible.

    • by tlhIngan ( 30335 ) <slashdot.worf@net> on Wednesday April 08, 2026 @02:59PM (#66083694)

      Microsoft issues the secure boot keys that are used by all Linux distributions.

      If they can just arbitrarily yank someone's keys like this, apparently without explanation or appeal, then what does that mean for those Linux keys? Are they subject to withdrawal for no reason as well?

      Incorrect. Microsoft signs the boot shim. This lets you use Secure Boot with the default Microsoft keys you use to boot Windows. So any PC, with Secure Boot enabled, can boot Linux. The keys built into every PC are Microsoft's, and even if you hard reset the machine, they will revert to those Microsoft keys.

      You are encouraged though if you run Linux, to create your own keys, and install them on your PC. Doing so would require you to re-sign the Microsoft bootloader but you are free to use your own keys. The only reason Microsoft signed the shim is because some OEMs do not make it easy to install a third-party key to secure-boot a non-Windows OS. So the Microsoft signed shim means if it can boot Windows, it can boot Linux.

      And I say shim because that's the actual component signed - major Linux distributions re-distributed the signed binary. But it's bootloader independent - you can use the signed shim to boot your own version of GRUB or other bootloader and continue the secure boot chain if desired. (If you use something like Ubuntu, you're likely to encounter this if you try to compile your own kernel or module where you then h ave to add a key to the shim so the kernel can run your new module.

      Microsoft can stop signing new shims, but that has nothing to do with Secure Boot. It's just a way so everything that can boot Windows can boot other OSes even if the OEMs lock down the computer.

      Big companies often use their own keys for secure boot.

    • Tell me you have no idea how Secure Boot works without telling me you have no idea how Secure Boot works. I bet you also think that Microsoft invented Secure Boot and has full control over it.
    • by gweihir ( 88907 )

      You can disable secure boot. But Microsoft clearly has too much power and too little oversight and consequences for when they screw up.

      • You can disable secure boot. But Microsoft clearly has too much power and too little oversight and consequences for when they screw up.

        You have clearly not enough knowledge and too much ignorance on the topic. No you don't need to disable secure boot. Microsoft has no control over secure boot. You can even load your own custom keys for the Windows boot process, to say nothing of Linux's secure boot process having zero to do with Microsoft control either.

        But you don't care, you've been told this before. At this point you're willfully ignorant.

        • Microsoft has no control over secure boot. You can even load your own custom keys for the Windows boot process

          Microsoft has control over distribution of the copyrighted Windows operating system. It has used this control to dictate whether or not makers of devices that include Windows are allowed to let users load their own custom keys. For example, Microsoft required makers of devices that come with Windows RT (the port of Windows 8 and Windows 8.1 to ARM architecture) to block end users from turning off Secure Boot and block end users from loading their own custom keys, as conditions for a license under copyright

          • Microsoft specifically denies windows certification to any device that doesn't allow secure boot to be disabled and custom keys loaded, and they have since the release of Windows 8.1 (13 years ago). There's no Windows RT devices on sale, and even Microsoft's own first party Surface Pro Snapdragon devices give you, the user, complete control over secure boot process and custom key loading.

            But if the best you can come up with is criticising a Windows version that flopped so badly it nearly took an entire idea

    • Microsoft issues the secure boot keys that are used by all Linux distributions.

      No, Microsoft issues secure boot keys that allow Linux to be booted by bootstrapping Microsoft's bootloader's shim. You don't need Microsoft to run secure boot in Linux, you just need to load your own key into the BIOS. SecureBoot is 100% under your control.

      The problem here that sets VeraCrypt apart is that VeraCrypt after doing its thing needs to load Microsoft's Bootloader. This entire system is interlinked. The whole point of secureboot was that software doesn't fuck with the boot process without authori

  • by Anonymous Coward
    N/T.
    • Re: (Score:1, Insightful)

      by Anonymous Coward
      Unlike Obama NSA who persecuted Snowden.
      • Versus the Little Shrub NSA or the Obama NSA? I thought you AC's were strongly pro-Blue.
        It wouldn't matter who was sitting in "The Chair"... they would all prosecute Snowden (although what he did was good) for leaking info.

  • US government (Score:5, Insightful)

    by dskoll ( 99328 ) on Wednesday April 08, 2026 @01:26PM (#66083544) Homepage

    Clearly, the US government is unhappy with regular people having robust data encryption.

    This is why it is folly for non-US organizations to continue using closed-source US-based software. If they can't see the security risks inherent in this practice, then I don't know what to say.

    • It's pretty risky to use any software from a monoculture. You risk going down at the same time as everyone else during a big exploit. You risk getting hit with zero-day code and sitting there compromised without even knowing it. At least, it appears your risk is significantly higher if you are on a closed source commercial operating system.

      Security weenies claim security via obscurity doesn't work, but it absolutely does if you like to use data and respect what it tells you. Check the number of sec
      • by Anonymous Coward
        This is why I stick with my Amiga emulator under OS/2.
        • This is why I stick with my Amiga emulator under OS/2.

          Can't have your security broken if there is no security. I like the cut of your jib.

      • Re: US government (Score:4, Insightful)

        by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Wednesday April 08, 2026 @01:57PM (#66083602) Homepage Journal

        "Security weenies claim security via obscurity doesn't work, but it absolutely does if you like to use data and respect what it tells you. Check the number of security CVEs for operating systems like OpenVMS, MPE/IX, and see how they compare with Linux or Windows. By volume, the most popular OSes get the most attacks and successful exploits."

        That is not security by obscurity. It's security by unpopularity.

      • by HiThere ( 15173 )

        "Security by obscurity" doesn't work by itself. It's a necessary component of every security policy, however. You can't just pick one. (It's called "defense in depth", but that's not really a good metaphor.)

    • Re:US government (Score:5, Insightful)

      by Locke2005 ( 849178 ) on Wednesday April 08, 2026 @01:55PM (#66083592)
      Put it this way: would you use a closed-source OS implemented in China? What makes you think the US government is more trustworthy than the Chinese government, especially given the direction Trump is taking it? (To be fair, it's been heading that way ever since 9/11.)
      • by HiThere ( 15173 )

        If you want to be fair, it's been headed that way ever since the 1860's. And prior to that the individual states were headed that way.

        People in power like to make their jobs easier.

        • Hehe... I know.
          Not all bad stuff strictly happened, only, ever under Trump... no other President is safe from accusations and such... didn't the Little Shrub invade Iraq under false-pretenses? Did he get rid of terrorism?.

          A lot of those are hardcore pro-Immigration (legal and illegal), hardcore anti-Trump, hardcore pro-Blue state, who don't bring anything to the conversation besides trying to start arguments and crap... if you ask them to give links to anything that verifies their claims, you'll never get

      • by JBMcB ( 73720 )

        =What makes you think the US government is more trustworthy than the Chinese government, especially given the direction Trump is taking it?=

        Because the US government doesn't make operating systems? They've taken Apple to court to get unfettered access to iPhones and have lost. It's far from perfect, but there is still a system of checks and balances happening.

        Besides that, you can post a photo of yourself holding the bloody severed head of Trump, and the worst that happens to you is loosing a gig at CNN and a squatty potty endorsement job. If you call president Xi a silly name, you disappear.

      • (To be fair, it's been heading that way ever since 9/11.)

        Actually, a lot longer than that; however, 9/11 was a catalyst that brought things to a boil.

    • "Never ascribe to malice what can be adequately explained by incompetence." Microsoft is probably using AI to review all the people with signing keys, and it hallucinated a reason to terminate his account. They've been blindly trusting their AI for all sorts of things it can't do properly.

      • by HiThere ( 15173 )

        It might be a hallucination, or it might be a real problem. And there are other possibilities. (E.g. earlier it was suggested that MS noticed a bad bug *somehow* and the government didn't want the bug to be fixed.)

      • "Never ascribe to malice what can be adequately explained by incompetence."

        The problem in this case is that Microsoft has a long and extremely well documented history of both of these things.

    • by gweihir ( 88907 )

      Indeed. At least Europe is slowly catching on.

    • Or, someone didn't check their email.

      Microsoft Vice President Scott Hanselman said the developer accounts were automatically suspended because they failed the "mandatory account verification for all partners in the Windows Hardware Program who have not completed account verification since April 2024" that the company had been emailing "everyone" about since October 2025. https://www.bleepingcomputer.c... [bleepingcomputer.com]

  • My guess (Score:4, Interesting)

    by Locke2005 ( 849178 ) on Wednesday April 08, 2026 @01:52PM (#66083588)
    Microsoft is in bed with the NSA, and the NSA doesn't want people to be able to secure their Windows against government spying.
    • by Z00L00K ( 682162 )

      Add to it that Microsoft don't want anyone to use something more secure than Bitlocker.

    • Hardly. If the user has access to files then Microsoft does as well. That's the fundamental problem with this debate by multiple people here. If you can open a file then Microsoft has access to it. If you use VeraCrypt to secure your windows partition then Microsoft has access to all the files since you literally need to decrypt the partition to load the OS.

      Tinfoil hats are not a nice fashion accessory.

  • by Anonymous Coward

    This tells me that there is a bug in the current Windows version that the TLAs are using.

  • those in power will want it to go away.

  • by JaredOfEuropa ( 526365 ) on Wednesday April 08, 2026 @02:35PM (#66083660) Journal
    Wireguard [ycombinator.com], a lightweight and secure VPN
    Windscribe [x.com], a VPN service.
    • Wireguard [ycombinator.com], a lightweight and secure VPN Windscribe [x.com], a VPN service.

      Microsoft has been raising the bar for kernel drivers for a while now. I am thinking that in their enthusiasm for reducing the attack surface (which in the abstract would be a good thing), they have gone too far, or at least too fast.

    • by gweihir ( 88907 )

      Which somehow is not a surprise. Well, time to kick US monopolies to the curb.

    • by kriston ( 7886 )

      Why do we need kernel drivers for a VPN?

  • by Yo,dog! ( 1819436 ) on Wednesday April 08, 2026 @02:48PM (#66083676)
    "There are no appeals available, we have closed your application"
    That's two sentences that should be separated by a period, not a comma.
  • by jonwil ( 467024 ) on Thursday April 09, 2026 @02:06AM (#66084604)

    A higher up at Microsoft posted on twitter saying the issue was caused by paperwork that these projects didn't do, that all of them were impacted at once because the missing paperwork is tied to a deadline and that Microsoft is working to get it sorted out so these projects can continue.

    • I like how nobody considered that possibility and instead ran with, "it must be the government", or, "gosh, Microsoft sure is evil."
      • by whitroth ( 9367 )

        And you *don't* think that the FBI wants something with a backdoor?

        Ples... are you claiming M$ ISN'T evil?

        • I didn't say either of those things were true or false. I was noting that nobody considered any other explanation, they just ran with bad assumptions. Did anyone ask if maybe the devs screwed something up? Nope.

          Maybe it's because the article was not properly researched, leaving everyone to make up their own explanations. 404 sure seems to have missed this - https://techcommunity.microsof... [microsoft.com]

Cobol programmers are down in the dumps.

Working...