Improve consistency
This commit is contained in:
parent
280bc9aa8e
commit
bce0f73331
112
Changelog.md
112
Changelog.md
|
@ -1,7 +1,7 @@
|
||||||
# v1.25 (A future release)
|
# v1.25 (A future release)
|
||||||
<ul>
|
<ul>
|
||||||
<li>✓ Improve Internals documentation (header format, etc.)</li>
|
|
||||||
<li>Improve Reed-Solomon performance</li>
|
<li>Improve Reed-Solomon performance</li>
|
||||||
|
<li>✓ Improve Internals documentation (header format, etc.)</li>
|
||||||
<li>✓ Save as and keyfile file dialog now opens in the same directory as dropped files</li>
|
<li>✓ Save as and keyfile file dialog now opens in the same directory as dropped files</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
|
||||||
|
@ -21,7 +21,7 @@
|
||||||
|
|
||||||
# v1.23 (Released 03/19/2022)
|
# v1.23 (Released 03/19/2022)
|
||||||
<ul>
|
<ul>
|
||||||
<li><strike>Remove EXIF data from keyfiles</strike> (there is no native or "official" EXIF stripper, and existing implementations are either not written in Go, or experimental)</li>
|
<li>✓ <strike>Remove EXIF data from keyfiles</strike> (there is no native or "official" EXIF stripper, and existing implementations are either not written in Go, or experimental)</li>
|
||||||
<li>✓ Removed the checksum generator to get back on track with original Picocrypt ideology</li>
|
<li>✓ Removed the checksum generator to get back on track with original Picocrypt ideology</li>
|
||||||
<li>✓ Cleaned up and optimized code</li>
|
<li>✓ Cleaned up and optimized code</li>
|
||||||
<li>✓ Compiled with MinGW GCC11 instead of TDM-GCC, Go 1.18 instead of Go 1.17</li>
|
<li>✓ Compiled with MinGW GCC11 instead of TDM-GCC, Go 1.18 instead of Go 1.17</li>
|
||||||
|
@ -92,58 +92,58 @@
|
||||||
|
|
||||||
# v1.16 (Released 08/11/2021)
|
# v1.16 (Released 08/11/2021)
|
||||||
<ul>
|
<ul>
|
||||||
<li>Fixed bug when entering a wrong password when decrypting a splitted file</li>
|
<li>✓ Fixed bug when entering a wrong password when decrypting a splitted file</li>
|
||||||
<li>Fixed bug where an existing file is delete when a wrong password is used</li>
|
<li>✓ Fixed bug where an existing file is delete when a wrong password is used</li>
|
||||||
<li>The password generator is now customizable</li>
|
<li>✓ The password generator is now customizable</li>
|
||||||
<li>Make keyfile support more reliable (keyfile now out of Beta)</li>
|
<li>✓ Make keyfile support more reliable (keyfile now out of Beta)</li>
|
||||||
<li>Fix keyfile user flow issue</li>
|
<li>✓ Fix keyfile user flow issue</li>
|
||||||
<li>Bug fixes</li>
|
<li>✓ Bug fixes</li>
|
||||||
<li>UI fixes improvements</li>
|
<li>✓ UI fixes improvements</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
|
||||||
# v1.15 (Released 08/09/2021)
|
# v1.15 (Released 08/09/2021)
|
||||||
<ul>
|
<ul>
|
||||||
<li>Add cancel button to file shredder and custom number of passes</li>
|
<li>✓ Add cancel button to file shredder and custom number of passes</li>
|
||||||
<li>Password generator</li>
|
<li>✓ Password generator</li>
|
||||||
<li>Make password strength circle start at top</li>
|
<li>✓ Make password strength circle start at top</li>
|
||||||
<li>Fix shredder UI bugs</li>
|
<li>✓ Fix shredder UI bugs</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
|
||||||
# v1.14 (Released 08/07/2021)
|
# v1.14 (Released 08/07/2021)
|
||||||
<strong>v1.14 will unfortunately be incompatible with v1.13, as I have dropped Poly1305 in favour of an HMAC. Because I have appended the encryptor version to the encrypted data in v1.13, however, v1.14 and on will be able to tell you which version your data was encrypted with so that you can fetch the correct verion of Picocrypt. There are no security issues in any previous versions of Picocrypt as long as you use a strong password.</strong>
|
<strong>v1.14 will unfortunately be incompatible with v1.13, as I have dropped Poly1305 in favour of an HMAC. Because I have appended the encryptor version to the encrypted data in v1.13, however, v1.14 and on will be able to tell you which version your data was encrypted with so that you can fetch the correct verion of Picocrypt. There are no security issues in any previous versions of Picocrypt as long as you use a strong password.</strong>
|
||||||
<ul>
|
<ul>
|
||||||
<li>Low-severity security fix for the recently discovered <a href="https://eprint.iacr.org/2020/1491.pdf">partitioning oracle attacks</a></li>
|
<li>✓ Low-severity security fix for the recently discovered <a href="https://eprint.iacr.org/2020/1491.pdf">partitioning oracle attacks</a></li>
|
||||||
<li>Move from Monocypher to Go's standard supplemental ChaCha20 in favour of the latter being stateful</li>
|
<li>✓ Move from Monocypher to Go's standard supplemental ChaCha20 in favour of the latter being stateful</li>
|
||||||
<li>Add SHA3 (normal mode) and BLAKE2b (fast mode) as HMAC to replace Poly1305 and prevent partitioning oracle attacks</li>
|
<li>✓ Add SHA3 (normal mode) and BLAKE2b (fast mode) as HMAC to replace Poly1305 and prevent partitioning oracle attacks</li>
|
||||||
<li>Removed ~100 lines of unnecessary code now that Picocrypt uses Go's ChaCha20 (cleaner and stabler code)</li>
|
<li>✓ Removed ~100 lines of unnecessary code now that Picocrypt uses Go's ChaCha20 (cleaner and stabler code)</li>
|
||||||
<li>Added window icons</li>
|
<li>✓ Added window icons</li>
|
||||||
<li>Switch to a new Reed-Solomon encoder that automatically corrects errors</li>
|
<li>✓ Switch to a new Reed-Solomon encoder that automatically corrects errors</li>
|
||||||
<li>Add a "Paranoid mode", which will use the Serpent cipher in addition to XChaCha20</li>
|
<li>✓ Add a "Paranoid mode", which will use the Serpent cipher in addition to XChaCha20</li>
|
||||||
<li>Cleaner code with plenty of comments for people taking a look</li>
|
<li>✓ Cleaner code with plenty of comments for people taking a look</li>
|
||||||
<li>Metadata is now Reed-Solomon encoded (everything bit of header data is now RS-encoded for redundancy)</li>
|
<li>✓ Metadata is now Reed-Solomon encoded (everything bit of header data is now RS-encoded for redundancy)</li>
|
||||||
<li>Reed-Solomon checkbox is now enabled and Reed-Solomon works</li>
|
<li>✓ Reed-Solomon checkbox is now enabled and Reed-Solomon works</li>
|
||||||
<li>Implemented Dropbox's zxcvbn password strength checker</li>
|
<li>✓ Implemented Dropbox's zxcvbn password strength checker</li>
|
||||||
<li>Removed paranoid shredding as it is too hard to implement correctly and not cross platform</li>
|
<li>✓ Removed paranoid shredding as it is too hard to implement correctly and not cross platform</li>
|
||||||
<li>Fixed Windows zip extract error notice that doesn't appear in 7-Zip (edit: it was a backslash and forwardslash issue)</li>
|
<li>✓ Fixed Windows zip extract error notice that doesn't appear in 7-Zip (edit: it was a backslash and forwardslash issue)</li>
|
||||||
<li>Optional shred temporary files checkbox</li>
|
<li>✓ Optional shred temporary files checkbox</li>
|
||||||
<li>Remove BLAKE3 from the checksum generator tab, as it has no practical use and requires a non-standard library</li>
|
<li>✓ Remove BLAKE3 from the checksum generator tab, as it has no practical use and requires a non-standard library</li>
|
||||||
<li>Advanced options are shown dynamically depending on whether encrypting or decrypting</li>
|
<li>✓ Advanced options are shown dynamically depending on whether encrypting or decrypting</li>
|
||||||
<li>Window closing disabled during encryption/decryption/shredding to prevent leakage of temporary files</li>
|
<li>✓ Window closing disabled during encryption/decryption/shredding to prevent leakage of temporary files</li>
|
||||||
<li>Reduce padding of metadataLength from 10 to 5 (you probably won't type more than 99999 metadata characters)</li>
|
<li>✓ Reduce padding of metadataLength from 10 to 5 (you probably won't type more than 99999 metadata characters)</li>
|
||||||
<li>Use regex to check if an input file is a valid Picocrypt volume or not (during decryption)</li>
|
<li>✓ Use regex to check if an input file is a valid Picocrypt volume or not (during decryption)</li>
|
||||||
<li>Improved user flow as well as fix UI bugs</li>
|
<li>✓ Improved user flow as well as fix UI bugs</li>
|
||||||
<li>Code optimizations</li>
|
<li>✓ Code optimizations</li>
|
||||||
<li>Many bug fixes/stability improvments</li>
|
<li>✓ Many bug fixes/stability improvments</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
|
||||||
# v1.13 (Released 5/29/2021)
|
# v1.13 (Released 5/29/2021)
|
||||||
<strong>Note: v1.13 will be INCOMPATIBLE with all previous releases! <s>This will likely be the last change in the header format, meaning that all future releases _should_ be compatible with v1.13 and on.</s></strong>
|
<strong>Note: v1.13 will be INCOMPATIBLE with all previous releases! <s>This will likely be the last change in the header format, meaning that all future releases _should_ be compatible with v1.13 and on.</s></strong>
|
||||||
<ul>
|
<ul>
|
||||||
<li>Picocrypt has been ported from Python to Go, thus completely rewritten</li>
|
<li>✓ Picocrypt has been ported from Python to Go, thus completely rewritten</li>
|
||||||
<li>Added fast mode, which can achieve ~250MB/s</li>
|
<li>✓ Added fast mode, which can achieve ~250MB/s</li>
|
||||||
<li>Added file shredder and file checksum generator</li>
|
<li>✓ Added file shredder and file checksum generator</li>
|
||||||
<li>Automatically checks for newer versions</li>
|
<li>✓ Automatically checks for newer versions</li>
|
||||||
<li>Added file chunking support</li>
|
<li>✓ Added file chunking support</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
|
||||||
# v1.12.1 (Bug fix patch, released 04/11/2021)
|
# v1.12.1 (Bug fix patch, released 04/11/2021)
|
||||||
|
@ -151,25 +151,25 @@ There was a major bug in v1.12 that caused the "Secure wipe" feature to show "Un
|
||||||
|
|
||||||
# v1.12 (Released 04/07/2021)
|
# v1.12 (Released 04/07/2021)
|
||||||
<ul>
|
<ul>
|
||||||
<li>Beautiful UI</li>
|
<li>✓ Beautiful UI</li>
|
||||||
<li>More than x2 as fast as previous versions</li>
|
<li>✓ More than x2 as fast as previous versions</li>
|
||||||
<li>Add cancel button to cancel encryption/decryption</li>
|
<li>✓ Add cancel button to cancel encryption/decryption</li>
|
||||||
<li>(Bug) Delete existing file only if password is correct</li>
|
<li>✓ (Bug) Delete existing file only if password is correct</li>
|
||||||
<li>Minor aesthetic fixes</li>
|
<li>✓ Minor aesthetic fixes</li>
|
||||||
<li>Complete rewrite from scratch, to ensure reliability and security</li>
|
<li>✓ Complete rewrite from scratch, to ensure reliability and security</li>
|
||||||
<li>Better anti-corruption (re-defined header format)</li>
|
<li>✓ Better anti-corruption (re-defined header format)</li>
|
||||||
<li>Switch to Argon2d instead Argon2id for better security</li>
|
<li>✓ Switch to Argon2d instead Argon2id for better security</li>
|
||||||
<li>Switch from SHA3 to BLAKE3 for corruption check</li>
|
<li>✓ Switch from SHA3 to BLAKE3 for corruption check</li>
|
||||||
<li>Better user flow</li>
|
<li>✓ Better user flow</li>
|
||||||
</ul>
|
</ul>
|
||||||
<strong>Note: v1.12 will be INCOMPATIBLE with all previous releases!</strong>
|
<strong>Note: v1.12 will be INCOMPATIBLE with all previous releases!</strong>
|
||||||
|
|
||||||
# v1.11 (released 03/23/2021)
|
# v1.11 (released 03/23/2021)
|
||||||
<ul>
|
<ul>
|
||||||
<li>Much more secure wipe via <code>sdelete64</code> for Windows, <code>shred</code> for Linux, and <code>rm -P</code> for MacOS</li>
|
<li>✓ Much more secure wipe via <code>sdelete64</code> for Windows, <code>shred</code> for Linux, and <code>rm -P</code> for MacOS</li>
|
||||||
<li>Much more beautiful UI for MacOS</li>
|
<li>✓ Much more beautiful UI for MacOS</li>
|
||||||
<li>Robust secure wipe support for drag and dropped files/folders</li>
|
<li>✓ Robust secure wipe support for drag and dropped files/folders</li>
|
||||||
<li>Only open input files in read mode, since write mode is unnecessary</li>
|
<li>✓ Only open input files in read mode, since write mode is unnecessary</li>
|
||||||
<li>Clean up source code, add better comments</li>
|
<li>✓ Clean up source code, add better comments</li>
|
||||||
<li><strong>New: </strong>Drag and drop support (multiple files, a folder, a file and a folder, etc.)</li>
|
<li>✓ <strong>New: </strong>Drag and drop support (multiple files, a folder, a file and a folder, etc.)</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
|
Loading…
Reference in New Issue