Update Changelog.md

This commit is contained in:
Evan Su 2021-08-09 18:35:31 -04:00 committed by GitHub
parent 763aefd57e
commit 2ec83a8b69
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 9 additions and 2 deletions

View File

@ -1,4 +1,4 @@
# v1.15 (work in progress, no ETA at the moment) # v1.16 (work in progress, no ETA at the moment)
<ul> <ul>
<li>Add cancel button to file shredder and custom # of passes</li> <li>Add cancel button to file shredder and custom # of passes</li>
<li>File name encryption</li> <li>File name encryption</li>
@ -10,7 +10,14 @@
<li>Improve Reed-Solomon performance</li> <li>Improve Reed-Solomon performance</li>
</ul> </ul>
# v1.14 (ETA: Released 08/07/2021) # v1.15 (ETA: 3 days)
<ul>
<li>Add cancel button to file shredder and custom # of passes</li>
<li>Password generator</li>
<li>Make password strength circle start at top</li>
</ul>
# v1.14 (Released 08/07/2021)
<strong>v1.14 will unfortunately be incompatible with v1.13, as I have dropped Poly1305 in favour of an HMAC. Because I have appended the encryptor version to the encrypted data in v1.13, however, v1.14 and on will be able to tell you which version your data was encrypted with so that you can fetch the correct verion of Picocrypt. There are no security issues in any previous versions of Picocrypt as long as you use a strong password.</strong> <strong>v1.14 will unfortunately be incompatible with v1.13, as I have dropped Poly1305 in favour of an HMAC. Because I have appended the encryptor version to the encrypted data in v1.13, however, v1.14 and on will be able to tell you which version your data was encrypted with so that you can fetch the correct verion of Picocrypt. There are no security issues in any previous versions of Picocrypt as long as you use a strong password.</strong>
<ul> <ul>
<li>Low-severity security fix for the recently discovered <a href="https://eprint.iacr.org/2020/1491.pdf">partitioning oracle attacks</a></li> <li>Low-severity security fix for the recently discovered <a href="https://eprint.iacr.org/2020/1491.pdf">partitioning oracle attacks</a></li>