It's not that there is anything wrong with but it does not cascade like VeraCrypt.
VeraCrypt offers up to 3 levels of cascading encryption. AES-TwoFish-Serpent. It is like a safe inside a safe inside a safe.
To add another layer of safety, an encrypted volume can be set up inside the operating system volume.
On top of that, VeraCrypt has the concept of PIM which defines the number of times your password is hashed before being used to decrypt the disk.
If you want something nobody can break for the next 1000 years, use the above with a really long quasy-random passphrase which is really the weakest point but above 20 chars it's bazillion to the power of gazillion combinations.
I multiboot and I managed to confuse VC and almost bricked my box when I encrypted the bootloader itself, much like bitlocker. Instead of doing that, I VC each individual disk so that an encrypted disk can be on the machine next to an unencrypted one.
Linux's LUKS is probably fine for everyday stuff nothing special security. I would probably still setup a VC container inside a LUKS system.
I wonder how well Windows bitlocker can play with the main volume encrypted with VeraCrypt.