The good, the bad and the ugly.
I've used it and it's also good for deniable encryption.
the only problem with my Veracrypt encrypted deniable concealed virtual drive is, er, I can't find it.
That and it refused to encrypt the whole boot drive on Win 8. Something to do with drive formats?
Not sure if this is the problem: Note: By default, Windows 7 and later boot from a special small partition. The partition contains files that are required to boot the system. Windows allows only applications that have administrator privileges to write to the partition (when the system is running). VeraCrypt encrypts the partition only if you choose to encrypt the whole system drive (as opposed to choosing to encrypt only the partition where Windows is installed).
Ah, apparently it doesn't work with GUID partitions http://www.pcworld.com/article/2858642/you-can-encrypt-your-hard-drive-but-the-protection-may-not-be-worth-the-hassle.html
Not sure whether to trust PC world though
The conclusion I came to was that the simplest solution is upgrade to Win10.
An oldish debate on UEFI lack of support https://sourceforge.net/p/veracrypt/discussion/tec
Final post on UEFI support
There are several compatibility issues. In most cases it works.
Interesting LUKS encrypted partition hashcat brute force attack write-up https://hashcat.net/forum/thread-6225.html
This doesn't mean LUKS is broken, just that the method described is faster than previous attempts but is still very slow due to the initial PBKDF2 work factor. What's interesting is that the second work factor is bypassed.