VeraCrypt forces long iteration on shorter passphrases (>70 sec on my laptop, i.e. unusable), regardless of how secure that passphrase actually is. There is no way to switch this off. No response on a complaint. This and some other things lead me to not trust this person. I am back to the last TrueCrypt version that does not have this brain-dead and insulting limitation.
I agree with you completely, and it's the reason I'm still using TrueCrypt.
Secure high-entropy passwords aside, what the people responding to you don't get it is that the user should be allowed to have a more convenient, but more less secure encryption solution if he chooses. I have a short, low entropy password. I could write software that would crack it and it would complete the work in a day or two. I **know** that, and I don't care. I'm not protecting state secrets with it. I'm not worried the NSA will get hold of it. I just want the random person who finds my lost USB flash drive to not have immediate access to the data. Most people wouldn't care to crack it, from those that would most wouldn't know how to go about it. In the statistically unlikely case whoever finds it both wants to crack it and is able to, the data they'll find will be disappointing to them and not a big deal to me. Some of the things I encrypt are more for privacy than security.
Basically, any decent criminal can lock-pick my front door. I still lock it, and it protects against the opportunist criminal. That's the level of security I want, and it makes no sense to tell me I can't have it. They could just pop a big red and flashing warning when I first create the volume that says, "based on the password and number of iterations you've chosen the average desktop computer would be able to crack your encrypted volume in 32 hours. Are you sure you don't want to choose a more complex password?" At that point, they've done their due diligence.