

Moreover, sure, that DiskCryptor and VeraCrypt saves and will save a lot of good people lives, such as true journalists, social- and eco- activists, lawyers, opposition figures in dictator counties such as North Korea, Venezuela, Russia, Belarus, etc. where the authorities have already completely destroyed human rights and widely use tortures, abductions and poisoning freedom-oriented people.

But we have the problem: modern supercomputers can make more than 10^17 floating-point operations per second (FLOPS) so if it used for brute force cracking average human password - it become possible during seconds

Fortunately there is a solution of this problem - if we set some ”time interval between passwords attempts” (highly simplified wording). For example in VeraCrypt it was realized by using PIM (Personal Iterations Multiplier) - it is a multiplier on the number of iterations which “alters the number of iterations done with a hashing function.”: https://security.stackexchange.com/ques ... -necessary And nowadays it is still good protection of passwords brute-forcing until quantum computers become available in future.
So question is - does DiskCryptor have some anti brute-forcing protection as like PIM in VeraCrypt or something like this?
