Merge branch 'development' into v/crypto-input-parcel

Conflicts:
	OpenKeychain/src/main/java/org/sufficientlysecure/keychain/pgp/PgpSignEncryptOperation.java
	OpenKeychain/src/main/java/org/sufficientlysecure/keychain/service/KeychainIntentService.java
	OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/CertifyKeyFragment.java
	OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/EditKeyFragment.java
	OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/EncryptActivity.java
	OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/ImportKeysActivity.java
	OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/SafeSlingerActivity.java
	OpenKeychain/src/main/java/org/sufficientlysecure/keychain/ui/UploadKeyActivity.java
This commit is contained in:
Dominik Schürmann
2015-03-24 13:19:43 +01:00
235 changed files with 10182 additions and 8382 deletions

View File

@@ -19,6 +19,11 @@
android:title="@string/menu_manage_keys"
app:showAsAction="never" />
<item
android:id="@+id/menu_key_list_update_all_keys"
android:title="@string/menu_update_all_keys"
app:showAsAction="never" />
<item
android:id="@+id/menu_key_list_debug_cons"
android:title="Debug / Consolidate"

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> is an OpenPGP implementation for Android.</p>
<p>License: GPLv3+</p>
<h2>Developers</h2>
<ul>
<li>Dominik Schürmann (Maintainer)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Libraries</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (MIT X11 License)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">SafeSlinger Exchange library</a> (MIT License)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Support Libraries</a> (Apache License v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Apache License v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Apache License v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Apache License v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Apache License v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Apache License v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Apache License v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (Material Design)</a> (Apache License v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Apache License v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (MIT License)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Apache License v2)</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) is an OpenPGP implementation for Android.
License: GPLv3+
## Developers
* Dominik Schürmann (Maintainer)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Libraries
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (MIT X11 License)
* [SafeSlinger Exchange library](https://github.com/SafeSlingerProject/exchange-android) (MIT License)
* [Android Support Libraries](http://developer.android.com/tools/support-library/index.html) (Apache License v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Apache License v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Apache License v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Apache License v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Apache License v2)
* [ZXing](https://github.com/zxing/zxing) (Apache License v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Apache License v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Material Design)</a> (Apache License v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Apache License v2)
* [Snackbar](https://github.com/nispok/snackbar) (MIT License)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Apache License v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Apache License v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Apache License v2)

View File

@@ -0,0 +1,27 @@
## Key Confirmation
Without confirmation, you cannot be sure if a key really corresponds to a specific person.
The most simplest way to confirm a key is by scanning the QR Code or exchanging it via NFC.
To confirm keys between more than two persons, we suggest to use the key exchange method available for your keys.
## Key Status
<img src="status_signature_verified_cutout_24dp"/>
Confirmed: You have already confirmed this key, e.g., by scanning the QR Code.
<img src="status_signature_unverified_cutout_24dp"/>
Unconfirmed: This key has not been confirmed yet. You cannot be sure if the key really corresponds to a specific person.
<img src="status_signature_expired_cutout_24dp"/>
Expired: This key is no longer valid. Only the owner can extend its validity.
<img src="status_signature_revoked_cutout_24dp"/>
Revoked: This key is no longer valid. It has been revoked by its owner.
## Advanced Information
A "key confirmation" in OpenKeychain is implemented by creating a certification according to the OpenPGP standard.
This certification is a ["generic certification (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) described in the standard by:
"The issuer of this certification does not make any particular assertion as to how well the certifier has checked that the owner of the key is in fact the person described by the User ID."
Traditionally, certifications (also with higher certification levels, such as "positive certifications" (0x13)) are organized in OpenPGP's Web of Trust.
Our model of key confirmation is a much simpler concept to avoid common usability problems related to this Web of Trust.
We assume that keys are verified only to a certain degree that is still usable enough to be executed "on the go".
We also do not implement (potentially transitive) trust signatures or an ownertrust database like in GnuPG.
Furthermore, keys which contain at least one user ID certified by a trusted key will be marked as "confirmed" in the key listings.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>Fix key export to files (now for real)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>Fix key export to files (they were written partially)</li>
<li>Fix crash on Android 2.3</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Fix crash on Android 5</li>
<li>New certify screen</li>
<li>Secure Exchange directly from key list (SafeSlinger library)</li>
<li>New QR Code program flow</li>
<li>Redesigned decrypt screen</li>
<li>New icon usage and colors</li>
<li>Fix import of secret keys from Symantec Encryption Desktop</li>
<li>Subkey IDs on Yubikeys are now checked correctly</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>Better handling of large key imports</li>
<li>Improved subkey selection</li>
</ul>
<h2>3.0</h2>
<ul>
<li>Full support for Yubikey signature generation and decryption!</li>
<li>Propose installable compatible apps in apps list</li>
<li>New design for decryption screens</li>
<li>Many fixes for key import, also fixes stripped keys</li>
<li>Honor and display key authenticate flags</li>
<li>User interface to generate custom keys</li>
<li>Fixing user id revocation certificates</li>
<li>New cloud search (searches over traditional keyservers and keybase.io)</li>
<li>Support for stripping keys inside OpenKeychain</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>Fix keys broken in 2.9.1</li>
<li>Yubikey decryption now working via API</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>Split encrypt screen into two</li>
<li>Fix key flags handling (now supporting Mailvelope 0.7 keys)</li>
<li>Improved passphrase handling</li>
<li>Key sharing via SafeSlinger</li>
<li>Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain</li>
<li>Fix usage of stripped keys</li>
<li>SHA256 as default for compatibility</li>
<li>Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>OpenPGP API now handles revoked/expired keys and returns all user ids</li>
</ul>
<h2>2.9</h2>
<ul>
<li>Fixing crashes introduced in v2.8</li>
<li>Experimental ECC support</li>
<li>Experimental Yubikey support (signing-only with imported keys)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>So many bugs have been fixed in this release that we focus on the main new features</li>
<li>Key edit: awesome new design, key revocation</li>
<li>Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records</li>
<li>New first time screen</li>
<li>New key creation screen: autocompletion of name and email based on your personal Android accounts</li>
<li>File encryption: awesome new design, support for encrypting multiple files</li>
<li>New icons to show status of key (by Brennan Novak)</li>
<li>Important bug fix: Importing of large key collections from a file is now possible</li>
<li>Notification showing cached passphrases</li>
<li>Keys are connected to Android's contacts</li>
</ul>
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
<h2>2.7</h2>
<ul>
<li>Purple! (Dominik, Vincent)</li>
<li>New key view design (Dominik, Vincent)</li>
<li>New flat Android buttons (Dominik, Vincent)</li>
<li>API fixes (Dominik)</li>
<li>Keybase.io import (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>Some fixes for regression bugs</li>
</ul>
<h2>2.6</h2>
<ul>
<li>Key certifications (thanks to Vincent Breitmoser)</li>
<li>Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)</li>
<li>New design for signature verification</li>
<li>Custom key length (thanks to Greg Witczak)</li>
<li>Fix share-functionality from other apps</li>
</ul>
<h2>2.5</h2>
<ul>
<li>Fix decryption of symmetric OpenPGP messages/files</li>
<li>Refactored key edit screen (thanks to Ash Hughes)</li>
<li>New modern design for encrypt/decrypt screens</li>
<li>OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)</li>
</ul>
<h2>2.4</h2>
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>New unified key list</li>
<li>Colorized key fingerprint</li>
<li>Support for keyserver ports</li>
<li>Deactivate possibility to generate weak keys</li>
<li>Much more internal work on the API</li>
<li>Certify user ids</li>
<li>Keyserver query based on machine-readable output</li>
<li>Lock navigation drawer on tablets</li>
<li>Suggestions for emails on creation of keys</li>
<li>Search in public key lists</li>
<li>And much more improvements and fixes…</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>Hotfix for crash when upgrading from old versions</li>
</ul>
<h2>2.3</h2>
<ul>
<li>Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)</li>
<li>Fix setting expiry dates on keys (thanks to Ash Hughes)</li>
<li>More internal fixes when editing keys (thanks to Ash Hughes)</li>
<li>Querying keyservers directly from the import screen</li>
<li>Fix layout and dialog style on Android 2.2-3.0</li>
<li>Fix crash on keys with empty user ids</li>
<li>Fix crash and empty lists when coming back from signing screen</li>
<li>Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source</li>
<li>Fix upload of key from signing screen</li>
</ul>
<h2>2.2</h2>
<ul>
<li>New design with navigation drawer</li>
<li>New public key list design</li>
<li>New public key view</li>
<li>Bug fixes for importing of keys</li>
<li>Key cross-certification (thanks to Ash Hughes)</li>
<li>Handle UTF-8 passwords properly (thanks to Ash Hughes)</li>
<li>First version with new languages (thanks to the contributors on Transifex)</li>
<li>Sharing of keys via QR Codes fixed and improved</li>
<li>Package signature verification for API</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>API Updates, preparation for K-9 Mail integration</li>
</ul>
<h2>2.1</h2>
<ul>
<li>Lots of bug fixes</li>
<li>New API for developers</li>
<li>PRNG bug fix by Google</li>
</ul>
<h2>2.0</h2>
<ul>
<li>Complete redesign</li>
<li>Share public keys via QR codes, NFC beam</li>
<li>Sign keys</li>
<li>Upload keys to server</li>
<li>Fixes import issues</li>
<li>New AIDL API</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>Basic keyserver support</li>
<li>App2sd</li>
<li>More choices for passphrase cache: 1, 2, 4, 8, hours</li>
<li>Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)</li>
<li>Bugfixes</li>
<li>Optimizations</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>Fixed problem with signature verification of texts with trailing newline</li>
<li>More options for passphrase cache time to live (20, 40, 60 mins)</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Account adding crash on Froyo fixed</li>
<li>Secure file deletion</li>
<li>Option to delete key file after import</li>
<li>Stream encryption/decryption (gallery, etc.)</li>
<li>New options (language, force v3 signatures)</li>
<li>Interface changes</li>
<li>Bugfixes</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>German and Italian translation</li>
<li>Much smaller package, due to reduced BC sources</li>
<li>New preferences GUI</li>
<li>Layout adjustment for localization</li>
<li>Signature bugfix</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>Fixed another crash caused by some SDK bug with query builder</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>Fixed crashes during encryption/signing and possibly key export</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>Filterable key lists</li>
<li>Smarter pre-selection of encryption keys</li>
<li>New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers</li>
<li>Fixes and additional features (key preselection) for K-9 Mail, new beta build available</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>GMail account listing was broken in 1.0.0, fixed again</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>K-9 Mail integration, APG supporting beta build of K-9 Mail</li>
<li>Support of more file managers (including ASTRO)</li>
<li>Slovenian translation</li>
<li>New database, much faster, less memory usage</li>
<li>Defined Intents and content provider for other apps</li>
<li>Bugfixes</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integration of QR Scanner (New permissions required)
* Improved key creation wizard
* Fix missing contacts after sync
* Requires Android 4
* Redesigned key screen
* Simplify crypto preferences, better selection of secure ciphers
* API: Detached signatures, free selection of signing key,...
* Fix: Some valid keys were shown revoked or expired
* Don't accept signatures by expired or revoked subkeys
* Keybase.io support in advanced view
## 3.1.2
* Fix key export to files (now for real)
## 3.1.1
* Fix key export to files (they were written partially)
* Fix crash on Android 2.3
## 3.1
* Fix crash on Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Better handling of large key imports
* Improved subkey selection
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>How do I activate OpenKeychain in K-9 Mail?</h2>
<p>To use OpenKeychain with K-9 Mail, you want to follow these steps:</p>
<ol>
<li>Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.</li>
<li>Select "Account settings" and scroll to the very bottom and click "Cryptography".</li>
<li>Click on "OpenPGP Provider" and select OpenKeychain from the list.</li>
</ol>
<h2>I found a bug in OpenKeychain!</h2>
<p>Please report the bug using the <a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">issue tracker of OpenKeychain</a>.</p>
<h2>Contribute</h2>
<p>If you want to help us developing OpenKeychain by contributing code <a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">follow our small guide on Github</a>.</p>
<h2>Translations</h2>
<p>Help translating OpenKeychain! Everybody can participate at <a href="https://www.transifex.com/projects/p/openpgp-keychain/">OpenKeychain on Transifex</a>.</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## How do I activate OpenKeychain in K-9 Mail?
To use OpenKeychain with K-9 Mail, you want to follow these steps:
1. Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.
2. Select "Account settings" and scroll to the very bottom and click "Cryptography".
3. Click on "OpenPGP Provider" and select OpenKeychain from the list.
## I found a bug in OpenKeychain!
Please report the bug using the [issue tracker of OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribute
If you want to help us developing OpenKeychain by contributing code [follow our small guide on Github](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Translations
Help translating OpenKeychain! Everybody can participate at [OpenKeychain on Transifex](https://www.transifex.com/projects/p/openpgp-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> je OpenPGP implementace pro Android.</p>
<p>Licence: GPLv3+</p>
<h2>Vývojáři</h2>
<ul>
<li>Dominik Schürmann (Hlavní vývojář)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Knihovny</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (MIT X11 License)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">SafeSlinger Exchange library</a> (MIT License)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Support Libraries</a> (Apache License v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Apache License v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Apache License v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Apache License v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Apache License v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Apache License v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Apache License v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (Material Design)</a> (Apache License v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Apache License v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (MIT License)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Apache License v2)</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) is an OpenPGP implementation for Android.
License: GPLv3+
## Developers
* Dominik Schürmann (Maintainer)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Libraries
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (MIT X11 License)
* [SafeSlinger Exchange library](https://github.com/SafeSlingerProject/exchange-android) (MIT License)
* [Android Support Libraries](http://developer.android.com/tools/support-library/index.html) (Apache License v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Apache License v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Apache License v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Apache License v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Apache License v2)
* [ZXing](https://github.com/zxing/zxing) (Apache License v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Apache License v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Material Design)</a> (Apache License v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Apache License v2)
* [Snackbar](https://github.com/nispok/snackbar) (MIT License)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Apache License v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Apache License v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Apache License v2)

View File

@@ -0,0 +1,27 @@
## Key Confirmation
Without confirmation, you cannot be sure if a key really corresponds to a specific person.
The most simplest way to confirm a key is by scanning the QR Code or exchanging it via NFC.
To confirm keys between more than two persons, we suggest to use the key exchange method available for your keys.
## Key Status
<img src="status_signature_verified_cutout_24dp"/>
Confirmed: You have already confirmed this key, e.g., by scanning the QR Code.
<img src="status_signature_unverified_cutout_24dp"/>
Unconfirmed: This key has not been confirmed yet. You cannot be sure if the key really corresponds to a specific person.
<img src="status_signature_expired_cutout_24dp"/>
Expired: This key is no longer valid. Only the owner can extend its validity.
<img src="status_signature_revoked_cutout_24dp"/>
Revoked: This key is no longer valid. It has been revoked by its owner.
## Advanced Information
A "key confirmation" in OpenKeychain is implemented by creating a certification according to the OpenPGP standard.
This certification is a ["generic certification (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) described in the standard by:
"The issuer of this certification does not make any particular assertion as to how well the certifier has checked that the owner of the key is in fact the person described by the User ID."
Traditionally, certifications (also with higher certification levels, such as "positive certifications" (0x13)) are organized in OpenPGP's Web of Trust.
Our model of key confirmation is a much simpler concept to avoid common usability problems related to this Web of Trust.
We assume that keys are verified only to a certain degree that is still usable enough to be executed "on the go".
We also do not implement (potentially transitive) trust signatures or an ownertrust database like in GnuPG.
Furthermore, keys which contain at least one user ID certified by a trusted key will be marked as "confirmed" in the key listings.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>Fix key export to files (now for real)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>Fix key export to files (they were written partially)</li>
<li>Fix crash on Android 2.3</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Fix crash on Android 5</li>
<li>Nová obrazovka certifikace</li>
<li>Secure Exchange directly from key list (SafeSlinger library)</li>
<li>New QR Code program flow</li>
<li>Redesigned decrypt screen</li>
<li>New icon usage and colors</li>
<li>Fix import of secret keys from Symantec Encryption Desktop</li>
<li>Subkey IDs on Yubikeys are now checked correctly</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>Lepší fungování importu většího množství klíčů</li>
<li>Vylepšený výběr podklíčů</li>
</ul>
<h2>3.0</h2>
<ul>
<li>Full support for Yubikey signature generation and decryption!</li>
<li>Propose installable compatible apps in apps list</li>
<li>New design for decryption screens</li>
<li>Many fixes for key import, also fixes stripped keys</li>
<li>Honor and display key authenticate flags</li>
<li>User interface to generate custom keys</li>
<li>Fixing user id revocation certificates</li>
<li>New cloud search (searches over traditional keyservers and keybase.io)</li>
<li>Support for stripping keys inside OpenKeychain</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>Fix keys broken in 2.9.1</li>
<li>Yubikey decryption now working via API</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>Split encrypt screen into two</li>
<li>Fix key flags handling (now supporting Mailvelope 0.7 keys)</li>
<li>Vylepšené zacházení s hesly</li>
<li>Sdílení klíčů přes SafeSlinger</li>
<li>Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain</li>
<li>Fix usage of stripped keys</li>
<li>SHA256 as default for compatibility</li>
<li>Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>OpenPGP API now handles revoked/expired keys and returns all user ids</li>
</ul>
<h2>2.9</h2>
<ul>
<li>Fixing crashes introduced in v2.8</li>
<li>Experimentální podpora ECC</li>
<li>Experimental Yubikey support (signing-only with imported keys)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>So many bugs have been fixed in this release that we focus on the main new features</li>
<li>Key edit: awesome new design, key revocation</li>
<li>Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records</li>
<li>Nová úvodní obrazovka</li>
<li>New key creation screen: autocompletion of name and email based on your personal Android accounts</li>
<li>File encryption: awesome new design, support for encrypting multiple files</li>
<li>New icons to show status of key (by Brennan Novak)</li>
<li>Important bug fix: Importing of large key collections from a file is now possible</li>
<li>Notification showing cached passphrases</li>
<li>Klíče jsou připojeny ke kontaktům v Androidu</li>
</ul>
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
<h2>2.7</h2>
<ul>
<li>Purple! (Dominik, Vincent)</li>
<li>New key view design (Dominik, Vincent)</li>
<li>New flat Android buttons (Dominik, Vincent)</li>
<li>API fixes (Dominik)</li>
<li>Keybase.io import (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>Some fixes for regression bugs</li>
</ul>
<h2>2.6</h2>
<ul>
<li>Key certifications (thanks to Vincent Breitmoser)</li>
<li>Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)</li>
<li>New design for signature verification</li>
<li>Custom key length (thanks to Greg Witczak)</li>
<li>Fix share-functionality from other apps</li>
</ul>
<h2>2.5</h2>
<ul>
<li>Fix decryption of symmetric OpenPGP messages/files</li>
<li>Refactored key edit screen (thanks to Ash Hughes)</li>
<li>New modern design for encrypt/decrypt screens</li>
<li>OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)</li>
</ul>
<h2>2.4</h2>
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>New unified key list</li>
<li>Obarvit otisk klíče</li>
<li>Support for keyserver ports</li>
<li>Deactivate possibility to generate weak keys</li>
<li>Much more internal work on the API</li>
<li>Certifikovat uživatelská ID</li>
<li>Keyserver query based on machine-readable output</li>
<li>Lock navigation drawer on tablets</li>
<li>Suggestions for emails on creation of keys</li>
<li>Search in public key lists</li>
<li>And much more improvements and fixes…</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>Hotfix for crash when upgrading from old versions</li>
</ul>
<h2>2.3</h2>
<ul>
<li>Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)</li>
<li>Fix setting expiry dates on keys (thanks to Ash Hughes)</li>
<li>More internal fixes when editing keys (thanks to Ash Hughes)</li>
<li>Querying keyservers directly from the import screen</li>
<li>Fix layout and dialog style on Android 2.2-3.0</li>
<li>Fix crash on keys with empty user ids</li>
<li>Fix crash and empty lists when coming back from signing screen</li>
<li>Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source</li>
<li>Fix upload of key from signing screen</li>
</ul>
<h2>2.2</h2>
<ul>
<li>New design with navigation drawer</li>
<li>New public key list design</li>
<li>New public key view</li>
<li>Bug fixes for importing of keys</li>
<li>Key cross-certification (thanks to Ash Hughes)</li>
<li>Handle UTF-8 passwords properly (thanks to Ash Hughes)</li>
<li>First version with new languages (thanks to the contributors on Transifex)</li>
<li>Sharing of keys via QR Codes fixed and improved</li>
<li>Package signature verification for API</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>API Updates, preparation for K-9 Mail integration</li>
</ul>
<h2>2.1</h2>
<ul>
<li>Lots of bug fixes</li>
<li>New API for developers</li>
<li>PRNG bug fix by Google</li>
</ul>
<h2>2.0</h2>
<ul>
<li>Complete redesign</li>
<li>Share public keys via QR codes, NFC beam</li>
<li>Podepsat klíče</li>
<li>Nahrát klíče na server</li>
<li>Fixes import issues</li>
<li>New AIDL API</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>Základní podpora keyserverů</li>
<li>App2sd</li>
<li>More choices for passphrase cache: 1, 2, 4, 8, hours</li>
<li>Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)</li>
<li>Opravy chyb</li>
<li>Optimalizace</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>Fixed problem with signature verification of texts with trailing newline</li>
<li>More options for passphrase cache time to live (20, 40, 60 mins)</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Account adding crash on Froyo fixed</li>
<li>Bezpečné mazání souborů</li>
<li>Option to delete key file after import</li>
<li>Stream encryption/decryption (gallery, etc.)</li>
<li>New options (language, force v3 signatures)</li>
<li>Interface changes</li>
<li>Opravy chyb</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>Německý a Italský překlad</li>
<li>Much smaller package, due to reduced BC sources</li>
<li>New preferences GUI</li>
<li>Layout adjustment for localization</li>
<li>Signature bugfix</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>Fixed another crash caused by some SDK bug with query builder</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>Fixed crashes during encryption/signing and possibly key export</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>Filterable key lists</li>
<li>Smarter pre-selection of encryption keys</li>
<li>New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers</li>
<li>Fixes and additional features (key preselection) for K-9 Mail, new beta build available</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>GMail account listing was broken in 1.0.0, fixed again</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>K-9 Mail integration, APG supporting beta build of K-9 Mail</li>
<li>Support of more file managers (including ASTRO)</li>
<li>Slovenian translation</li>
<li>New database, much faster, less memory usage</li>
<li>Defined Intents and content provider for other apps</li>
<li>Opravy chyb</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integration of QR Scanner (New permissions required)
* Improved key creation wizard
* Fix missing contacts after sync
* Requires Android 4
* Redesigned key screen
* Simplify crypto preferences, better selection of secure ciphers
* API: Detached signatures, free selection of signing key,...
* Fix: Some valid keys were shown revoked or expired
* Don't accept signatures by expired or revoked subkeys
* Keybase.io support in advanced view
## 3.1.2
* Fix key export to files (now for real)
## 3.1.1
* Fix key export to files (they were written partially)
* Fix crash on Android 2.3
## 3.1
* Fix crash on Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Better handling of large key imports
* Improved subkey selection
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>How do I activate OpenKeychain in K-9 Mail?</h2>
<p>To use OpenKeychain with K-9 Mail, you want to follow these steps:</p>
<ol>
<li>Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.</li>
<li>Select "Account settings" and scroll to the very bottom and click "Cryptography".</li>
<li>Click on "OpenPGP Provider" and select OpenKeychain from the list.</li>
</ol>
<h2>Našel jsem chybu v OpenKeychain!</h2>
<p>Nahlašte prosím chybu na <a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">bug trackeru OpenKeychain</a>.</p>
<h2>Přispět</h2>
<p>Pokud chcete pomoci vyvíjet OpenKeychain tak, že přispějete svými kodérskými schopnostmi <a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">přečtěte si naší malou příručku na Githubu</a>.</p>
<h2>Překlady</h2>
<p>Pomozte s překladem OpenKeychain! Každý se může zapojit na <a href="https://www.transifex.com/projects/p/openpgp-keychain/">Transifexu</a>.</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## How do I activate OpenKeychain in K-9 Mail?
To use OpenKeychain with K-9 Mail, you want to follow these steps:
1. Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.
2. Select "Account settings" and scroll to the very bottom and click "Cryptography".
3. Click on "OpenPGP Provider" and select OpenKeychain from the list.
## I found a bug in OpenKeychain!
Please report the bug using the [issue tracker of OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribute
If you want to help us developing OpenKeychain by contributing code [follow our small guide on Github](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Translations
Help translating OpenKeychain! Everybody can participate at [OpenKeychain on Transifex](https://www.transifex.com/projects/p/openpgp-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> ist eine OpenPGP-Implementierung für Android.</p>
<p>Lizenz: GPLv3+</p>
<h2>Entwickler</h2>
<ul>
<li>Dominik Schürmann (Leitender Entwickler)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Bibliotheken</h2>
<ul>
<li>
<a href="https://rtyley.github.com/spongycastle/">SpongyCastle</a> (MIT X11-Lizenz)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">SafeSlinger Exchange library</a> (MIT-Lizenz)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Support-Bibliotheken</a> (Apache-Lizenz v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Apache-Lizenz v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Apache-Lizenz v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Apache-Lizenz v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Apache-Lizenz v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Apache-Lizenz v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Apache-Lizenz v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (Material-Design)</a> (Apache-Lizenz v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Apache-Lizenz v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (MIT-Lizenz)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Apache-Lizenz v2)</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) is an OpenPGP implementation for Android.
License: GPLv3+
## Developers
* Dominik Schürmann (Maintainer)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Libraries
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (MIT X11 License)
* [SafeSlinger Exchange library](https://github.com/SafeSlingerProject/exchange-android) (MIT License)
* [Android Support Libraries](http://developer.android.com/tools/support-library/index.html) (Apache License v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Apache License v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Apache License v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Apache License v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Apache License v2)
* [ZXing](https://github.com/zxing/zxing) (Apache License v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Apache License v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Material Design)</a> (Apache License v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Apache License v2)
* [Snackbar](https://github.com/nispok/snackbar) (MIT License)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Apache License v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Apache License v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Apache License v2)

View File

@@ -0,0 +1,27 @@
## Key Confirmation
Without confirmation, you cannot be sure if a key really corresponds to a specific person.
The most simplest way to confirm a key is by scanning the QR Code or exchanging it via NFC.
To confirm keys between more than two persons, we suggest to use the key exchange method available for your keys.
## Key Status
<img src="status_signature_verified_cutout_24dp"/>
Confirmed: You have already confirmed this key, e.g., by scanning the QR Code.
<img src="status_signature_unverified_cutout_24dp"/>
Unconfirmed: This key has not been confirmed yet. You cannot be sure if the key really corresponds to a specific person.
<img src="status_signature_expired_cutout_24dp"/>
Expired: This key is no longer valid. Only the owner can extend its validity.
<img src="status_signature_revoked_cutout_24dp"/>
Revoked: This key is no longer valid. It has been revoked by its owner.
## Advanced Information
A "key confirmation" in OpenKeychain is implemented by creating a certification according to the OpenPGP standard.
This certification is a ["generic certification (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) described in the standard by:
"The issuer of this certification does not make any particular assertion as to how well the certifier has checked that the owner of the key is in fact the person described by the User ID."
Traditionally, certifications (also with higher certification levels, such as "positive certifications" (0x13)) are organized in OpenPGP's Web of Trust.
Our model of key confirmation is a much simpler concept to avoid common usability problems related to this Web of Trust.
We assume that keys are verified only to a certain degree that is still usable enough to be executed "on the go".
We also do not implement (potentially transitive) trust signatures or an ownertrust database like in GnuPG.
Furthermore, keys which contain at least one user ID certified by a trusted key will be marked as "confirmed" in the key listings.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>Behoben: Schlüsselexport in Datei (jetzt wirklich)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>Behoben: Schlüsselexport in Datei (wurde nur teilweise geschrieben)</li>
<li>Behoben: Absturz auf Android 2.3</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Behoben: Absturz auf Android 5</li>
<li>Neuer Beglaubigungsbildschirm</li>
<li>Sicherer Austausch direkt aus der Schlüsselliste (SafeSlinger-Bibliothek)</li>
<li>Neuer Programmablauf für QR-Codes</li>
<li>Neugestaltung des Entschlüsselungsbildschirms</li>
<li>Verwendung neuer Icons und neuer Farben</li>
<li>Behoben: Import geheimer Schlüssel von Symantec Encryption Desktop</li>
<li>Unterschlüssel-IDs auf Yubikeys werden nun richtig geprüft</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>Bessere Verarbeitung von großen Schlüsselimporten</li>
<li>Verbesserte Unterschlüsselauswahl</li>
</ul>
<h2>3.0</h2>
<ul>
<li>Volle Unterstützung für Yubikey-Signaturerzeugung und Entschlüsselung!</li>
<li>Kompatible, installierbare Apps in der App-Liste anzeigen</li>
<li>Neues Design für den Entschlüsselungsbildschirm</li>
<li>Viele Fehlerbehebungen für den Schlüsselimport, auch bei gekürzten Schlüsseln</li>
<li>Schlüsselauthentifizierungs-Flags berücksichtigen und anzeigen</li>
<li>Benutzeroberfläche zum Erzeugen benutzerdefinierter Schlüssel</li>
<li>Behoben: Benutzer-ID-Widerrufszertifikate</li>
<li>Neue Cloudsuche (sucht über traditionelle Schlüsselserver und über keybase.io)</li>
<li>Unterstützung für das Kürzen von Schlüsseln innerhalb von OpenKeychain</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>Behoben: Beschädigung von Schlüsseln in 2.9.1</li>
<li>Yubikey-Entschlüsselung funktioniert nun über die API</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>Verschlüsselungsbildschirm auf zwei aufgeteilt</li>
<li>Behoben: Handhabung von Schlüsselflags (Unterstützt nun Mailvelope 0.7 Schlüssel)</li>
<li>Handhabung von Passwörtern verbessert</li>
<li>Schlüsselaustausch mit SafeSlinger</li>
<li>Yubikey: neue Einstellung zur PIN-Änderung, zur Zeit funktioniert das Signieren nur mit der OpenPGP-API, nicht innerhalb von OpenKeychain</li>
<li>Behoben: Verwendung von gekürzten Schlüsseln</li>
<li>Standardmäßige Nutzung von SHA256 aus Kompatibilitätsgründen</li>
<li>Änderungen an der Intent-API, siehe https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>OpenPGP-API kann nun mit widerrufenen/abgelaufenen Schlüsseln umgehen und liefert alle Benutzer-IDs zurück</li>
</ul>
<h2>2.9</h2>
<ul>
<li>Behoben: Mit v2.8 eingeführte Abstürze</li>
<li>Experimentelle ECC-Unterstützung</li>
<li>Experimentelle Yubikey-Unterstützung (nur Signieren mit importierten Schlüsseln)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>Es wurden in dieser Version so viele Fehler behoben, dass wir uns besser auf die neuen Funktionen konzentrieren</li>
<li>Schlüsselbearbeitung: tolles neues Design und Schlüsselrückruf</li>
<li>Schlüsselimport: tolles neues Design, gesicherte Verbindungen zum Schlüsselserver über HKPS, Namensauflösung der Schlüsselserver über DNS SRV-Einträge</li>
<li>Neuer Bildschirm für ersten Start der App</li>
<li>Neuer Schlüsselerzeugungsbildschirm: Automatische Vorschläge für Name und E-Mail basierend auf deinen persönlichen Android-Konten</li>
<li>Dateiverschlüsselung: tolles neues Design, Unterstützung für Verschlüsselung mehrerer Dateien</li>
<li>Neue Symbole zum Anzeigen des Schlüsselstatus (von Brennan Novak)</li>
<li>Wichtige Fehlerbehebung: Importieren größerer Schlüsselsammlungen aus einer Datei ist nun möglich</li>
<li>Benachrichtigung, die zwischengespeicherte Passwörter anzeigt</li>
<li>Schlüssel sind mit den Android-Kontakten verbunden</li>
</ul>
<p>Diese Version wäre ohne die Arbeit von Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray und Thialfihar nicht möglich</p>
<h2>2.7</h2>
<ul>
<li>Lila! (Dominik, Vincent)</li>
<li>Neues Schlüsselansicht-Design (Dominik, Vincent)</li>
<li>Neue flache Android-Schaltflächen (Dominik, Vincent)</li>
<li>API-Fehlerbehebungen (Dominik)</li>
<li>Import aus keybase.io (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>Einige Korrekturen für Regressionsfehler</li>
</ul>
<h2>2.6</h2>
<ul>
<li>Schlüsselbeglaubigungen (danke an Vincent Breitmoser)</li>
<li>Unterstützung für GnuPG-Teilschlüssel (Dank an Vincent Breitmoser)</li>
<li>Neues Design für Signaturprüfung</li>
<li>Benutzerdefinierte Schlüssellänge (Dank an Greg Witczak)</li>
<li>Fehler bei der Teilen-Funktion von anderen Apps behoben</li>
</ul>
<h2>2.5</h2>
<ul>
<li>Behoben: Entschlüsselung von symmetrischen OpenPGP-Nachrichten/-Dateien</li>
<li>Umgestaltung des Schlüsselbearbeitungsbildschirms (Dank an Ash Hughes)</li>
<li>Neues modernes Design für Verschlüsselungs-/Entschlüsselungsbildschirme</li>
<li>OpenPGP-API Version 3 (mehrerer API-Konten, interne Fehlerbehebungen, Schlüsselsuche)</li>
</ul>
<h2>2.4</h2>
<p>Danke an alle Bewerber des Google Summer of Code 2014, die diese Version funktionsreich und fehlerfrei gemacht haben.
Neben mehreren kleinen Updates sind eine beachtliche Anzahl von Updates von den folgenden Personen gemacht worden (in alphabetischer Reihenfolge):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>Neue einheitliche Schlüsselliste</li>
<li>Eingefärbter Schlüsselfingerabdruck</li>
<li>Unterstützung für Schlüsselserverports</li>
<li>Möglichkeit zum Erzeugen von schwachen Schlüsseln deaktiviert</li>
<li>Viel mehr interne Arbeit an der API</li>
<li>Benutzerkennungen beglaubigen</li>
<li>Schlüsselserver-Suchanfrage basierend auf maschinenlesbarer Ausgabe</li>
<li>"Navigation Drawer" auf Tablets sperren</li>
<li>Vorschläge für E-Mails bei Schlüsselerzeugung</li>
<li>Suche in öffentlichen Schlüssellisten</li>
<li>Und viele weitere Verbesserungen und Fehlerbehebungen...</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>Hotfix für Absturz beim Aktualisieren von alten Versionen</li>
</ul>
<h2>2.3</h2>
<ul>
<li>Kein unnötiger Export öffentlicher Schlüssel beim Export der geheimen Schlüssel (Dank an Ash Hughes)</li>
<li>Behoben: Setzen des Schlüsselablaufdatums (Dank an Ash Hughes)</li>
<li>Weitere interne Fehlerbehebungen für das Editieren von Schlüsseln (Dank an Ash Hughes)</li>
<li>Schlüsselserverabfrage direkt aus dem Importbildschirm</li>
<li>Behoben: Layout und Dialogstil auf Android 2.2-3.0</li>
<li>Behoben: Absturz bei leeren Benutzer-IDs</li>
<li>Behoben: Absturz nach Rückkehr vom Signierenbildschirm, außerdem wurden die Listen nicht geleert</li>
<li>Bouncy Castle (Kryptographie-Bibliothek) von 1.47 auf 1.50 aktualisiert und aus Quellcode kompiliert.</li>
<li>Behoben: Hochladen des Schlüssels aus dem Signierenbildschirm</li>
</ul>
<h2>2.2</h2>
<ul>
<li>Neues Design mit "Navigation Drawer"</li>
<li>Neues Design der Liste öffentlicher Schlüssel</li>
<li>Neue Ansicht für öffentliche Schlüssel</li>
<li>Behoben: Fehler beim Schlüsselimport</li>
<li>Schlüsselbeglaubigungen über Kreuz, "Key cross-certification" (Dank an Ash Hughes)</li>
<li>Korrekte Verarbeitung von UTF-8-Passwörtern (Dank an Ash Hughes)</li>
<li>Erste Version mit neuen Sprachen (Dank an die Unterstützer auf Transifex)</li>
<li>Behoben und verbessert: Teilen von Schlüsseln über QR-Codes</li>
<li>Paket-Signaturprüfung für API</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>API-Aktualisierungen, Vorbereitung für die "K-9 Mail"-Integration</li>
</ul>
<h2>2.1</h2>
<ul>
<li>Viele Fehlerbehebungen</li>
<li>Neue API für Entwickler</li>
<li>PRNG-Fehlerbehebung von Google</li>
</ul>
<h2>2.0</h2>
<ul>
<li>Komplette Neugestaltung</li>
<li>Öffentliche Schlüssel über QR-Codes oder NFC-Beam teilen</li>
<li>Schlüssel signieren</li>
<li>Schlüssel auf Server hochladen</li>
<li>Behoben: Importprobleme</li>
<li>Neue AIDL-API</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>Grundlegende Schlüsselserverunterstützung</li>
<li>App2sd</li>
<li>Mehr Auswahlmöglichkeiten für den Passwortzwischenspeicher: 1, 2, 4, 8, Stunden</li>
<li>Übersetzungen: Norwegisch (Dank an Sander Danielsen), Chinesisch (Dank an Zhang Fredrick)</li>
<li>Fehlerbehebungen</li>
<li>Optimierungen</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>Behoben: Problem mit Signaturprüfung von Texten mit angehängtem Zeilenvorschub</li>
<li>Mehr Optionen für die Länge der Passwortzwischenspeicherung (20, 40, 60 Minuten)</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Behoben: Absturz bei Kontenerstellung unter Froyo</li>
<li>Sichere Dateilöschung</li>
<li>Option zum Löschen der Schlüsseldatei nach dem Import</li>
<li>Streamverschlüsselung/-entschlüsselung (Galerie, usw.)</li>
<li>Neue Optionen (Sprache, v3-Signaturen erzwingen)</li>
<li>Schnittstellenänderungen</li>
<li>Fehlerbehebungen</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>Deutsche und Italienische Übersetzung</li>
<li>Viel kleineres Paket durch reduzierte BC-Quellen</li>
<li>Neue Einstellungsoberfläche</li>
<li>Layoutanpassungen für Übersetzungen</li>
<li>Behoben: Signaturfehler</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>Behoben: Absturz durch einen SDK-Fehler mit "query builder"</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>Behoben: Abstürze während Verschlüsselung/Beglaubigung und möglicherweise Schlüsselexport</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>Filterbare Schlüsselliste</li>
<li>Intelligentere Vorauswahl von Verschlüsselungsschlüsseln</li>
<li>New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers</li>
<li>Fehlerbehebungen und zusätzliche Funktionen für K-9-Mail (Schlüsselvorauswahl), neuer Beta-Build verfügbar</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>Behoben: GMail-Konto-Auflistung in 1.0.0 fehlerhaft</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>"K-9 Mail"-Integration, APG-unterstützendes Beta-Build von K-9 Mail</li>
<li>Unterstützung weiterer Dateimanager (inklusive ASTRO)</li>
<li>Slowenische Übersetzung</li>
<li>Neue Datenbank, viel schneller, geringere Speichernutzung</li>
<li>"Intents" und Inhaltsprovider für andere Apps definiert</li>
<li>Fehlerbehebungen</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integration of QR Scanner (New permissions required)
* Improved key creation wizard
* Fix missing contacts after sync
* Requires Android 4
* Redesigned key screen
* Simplify crypto preferences, better selection of secure ciphers
* API: Detached signatures, free selection of signing key,...
* Fix: Some valid keys were shown revoked or expired
* Don't accept signatures by expired or revoked subkeys
* Keybase.io support in advanced view
## 3.1.2
* Fix key export to files (now for real)
## 3.1.1
* Fix key export to files (they were written partially)
* Fix crash on Android 2.3
## 3.1
* Fix crash on Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Better handling of large key imports
* Improved subkey selection
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>Wie kann ich OpenKeychain in K-9 Mail nutzen?</h2>
<p>Um OpenKeychain in K-9 Mail nutzen zu können, sind folgende Schritte nötig:</p>
<ol>
<li>Öffne K-9 Mail und drücke lange auf den Account, mit dem du OpenKeychain nutzen willst.</li>
<li>Wähle "Kontoeinstellungen", blättere ganz nach unten und klicke auf "Kryptographie".</li>
<li>Klicke auf "OpenPGP-Provider" und wähle OpenKeychain aus der Liste.</li>
</ol>
<h2>Ich habe einen Fehler in OpenKeychain gefunden!</h2>
<p>Bitte sende uns einen Fehlerbericht mithilfe des <a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">Problem-Trackers von OpenKeychain</a>.</p>
<h2>Unterstützen</h2>
<p>Wenn du uns bei der Entwicklung von OpenKeychain, z.B. durch das Beisteuern von Code, helfen willst, <a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">schau dir unsere kurze Anleitung auf GitHub an</a>.</p>
<h2>Übersetzungen</h2>
<p>Hilf mit OpenKeychain zu übersetzten! Jeder kann mitmachen, besuche<a href="https://www.transifex.com/projects/p/openpgp-keychain/">OpenKeychain auf Transifex</a>.</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## How do I activate OpenKeychain in K-9 Mail?
To use OpenKeychain with K-9 Mail, you want to follow these steps:
1. Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.
2. Select "Account settings" and scroll to the very bottom and click "Cryptography".
3. Click on "OpenPGP Provider" and select OpenKeychain from the list.
## I found a bug in OpenKeychain!
Please report the bug using the [issue tracker of OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribute
If you want to help us developing OpenKeychain by contributing code [follow our small guide on Github](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Translations
Help translating OpenKeychain! Everybody can participate at [OpenKeychain on Transifex](https://www.transifex.com/projects/p/openpgp-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> es una implementación de OpenPGP para Android.</p>
<p>Licencia: GPLv3+</p>
<h2>Desarrolladores</h2>
<ul>
<li>Dominik Schürmann (Mantenedor)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Librerías</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (Licencia MIT X11)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">Librería SafeSlinger Exchange</a> (Licencia MIT)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Suppor Libraries</a> (Licencia Apache v2) [librerías de soporte de Android]</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Licencia Apache v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Licencia Apache v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Licencia Apache v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Licencia Apache v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Licencia Apache v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Licencia Apache v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip</a> (Licencia Apache v2) [indicador deslizante para paso de página estilo Material]</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Licencia Apache v2) [panel de navegación estilo Material]</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (Licencia MIT)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Licencia Apache v2) [botón de acción flotante]</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) es una implementación de OpenPGP para Android.
Licencia: GPLv3+
## Desarrolladores
* Dominik Schürmann (Mantenedor)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Librerías
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (Licencia MIT X11)
* [Librería SafeSlinger Exchange](https://github.com/SafeSlingerProject/exchange-android) (Licencia MIT)
* [Librerías de Soporte Android](http://developer.android.com/tools/support-library/index.html) (Licencia Apache v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Licencia Apache v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Licencia Apache v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Licencia Apache v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Licencia Apache v2)
* [ZXing](https://github.com/zxing/zxing) (Licencia Apache v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Licencia Apache v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Diseño estilo Material)</a> (Licencia Apache v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Licencia Apache v2)
* [Snackbar](https://github.com/nispok/snackbar) (Licencia MIT)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Licencia Apache v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Licencia Apache v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Licencia Apache v2)

View File

@@ -0,0 +1,27 @@
## Confirmación de clave
Sin confirmación, no puede estar seguro de si una clave corresponde realmente a una persona específica.
La forma más simple de confirmar una clave es escanear el código QR o intercambiarlo vía NFC.
Para confirmar claves entre más de dos personas, sugerimos usar el método de intercambio de claves disponible para sus claves.
## Estado de la clave
<img src="status_signature_verified_cutout_24dp"/>
Confirmada: Ya ha confirmado esta clave, ej. al escanear el código QR.
<img src="status_signature_unverified_cutout_24dp"/>
No confirmada: Esta clave no ha sido confirmada aún. No puede estar seguro de si la clave corresponde realmente a una persona específica.
<img src="status_signature_expired_cutout_24dp"/>
Caducada: Esta clave ya no es válida. Sólo el propietario puede extender su validez.
<img src="status_signature_revoked_cutout_24dp"/>
Revocada: Esta clave ya no es válida. Ha sido revocada por su propietario.
## Información avanzada
Una "confirmación de clave" en OpenKeychain se implementa al crear una certificación de acuerdo al estándar OpenPGP.
Esta certificación es una ["certificación genérica (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) descrita en el estándar por:
"El emisor de esta certificación no hace ninguna afirmación particular acerca de lo bien o mal que el certificador ha comprobado que el propietario de la clave sea de hecho la persona descrita por la identificación del usuario."
Tradicionalmente, las certificaciones (también con niveles más altos de certificación, tales como "certificaciones positivas" (0x13)) se organizan en la Web of Trust (web de confianza) de OpenPGP.
Nuestro modelo de confirmación de clave es un concepto mucho más simple para evitar problemas comunes de usabilidad relacionados con esta Web of Trust.
Asumimos que las claves están verificadas sólo hasta cierto grado, que no obstante es suficientemente usable para ejecutarse "sobre la marcha".
Tampoco implementamos firmas de confianza (potencialmente transitivas) o una base de datos ownertrust (de valores de confianza subjetivos del propietario) como en GnuPG.
Más aún, las claves que contengan al menos una identificación de usuario certificada por una clave de confianza se marcarán como "confirmadas" en los listados de claves.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>Repara la exportación de claves hacia ficheros (ahora de verdad)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>Repara la exportación de clave hacia ficheros (se guardaban parcialmente)</li>
<li>Repara caída en Android 2.3</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Repara una caída en Android 5</li>
<li>Nueva pantalla de certificación</li>
<li>Intercambio seguro directamente desde de la lista de claves (librería SafeSlinger)</li>
<li>Nuevo flujo de programa de Código QR</li>
<li>Pantalla de descifrado rediseñada</li>
<li>Nuevo uso del icono y colores</li>
<li>Repara la importación de claves secretas (privadas) desde Symantec Encryption Desktop</li>
<li>Las identificaciones de subclaves en Yubikeys ahora se comprueban correctamente</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>Tratamiento mejorado para importación de claves grandes</li>
<li>Selección de subclave mejorada</li>
</ul>
<h2>3.0</h2>
<ul>
<li>¡Soporte completo para generación y descifrado de firma de Yubikey!</li>
<li>Proposición de aplicaciones compatibles instalables desde la lista de aplicaciones</li>
<li>Nuevo diseño para pantallas de descifrado</li>
<li>Muchas reparaciones para la importación de claves, también reparaciones para claves desnudas</li>
<li>Muestra y acata los indicativos de autentificación de clave</li>
<li>Interfaz de usuario para generar claves personalizadas</li>
<li>Reacondicionado de los certifcados de revocación de identificación de usuario</li>
<li>Nueva búsqueda en la nube (búsquedas sobre servidores de claves tradicionales y keybase.io)</li>
<li>Soporte para claves desnudas dentro de OpenKeychain</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>Repara claves dañadas en 2.9.1</li>
<li>El descifrado de Yubikey funcionando ahora vía API</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>Dividir pantalla de cifrado en dos</li>
<li>Reparación del manejado de indicadores de clave (ahora soportando claves de Mailvelope 0.7)</li>
<li>Manejado mejorado de frase-contraseña</li>
<li>Compartición de clave mediante SafeSlinger</li>
<li>Yubikey: opción para permitir otros PINs, actualmente sólo funciona firmando a través de la API OpenPGP, no dentro de OpenKeychain</li>
<li>Reparación del uso de claves desnudas</li>
<li>SHA256 se usa como predeterminado para compatibilidad</li>
<li>La API de Intent ha cambiado, vea https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>La API de OpenPGP ahora maneja claves revocadas/expiradas y devuelve todas las identificación de usario</li>
</ul>
<h2>2.9</h2>
<ul>
<li>Repara caídas introducidas en la v2.8</li>
<li>Soporte ECC experimental</li>
<li>Soporte experimental para Yubikey (firma-sólo con claves importadas)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>Tantos fallos se han reparado en esta versión que nos centramos en las principales características nuevas</li>
<li>Edición de clave: Tremendo diseño nuevo, revocación de clave</li>
<li>Importación de clave: Tremendo diseño nuevo, conexiones seguras a servidor de claves vía hkps, resolución de servidor de claves vía registros SRV de DNS</li>
<li>Nueva pantalla de primera vez</li>
<li>Nueva pantalla de creación de clave: Autocompletado de un nombre o correo electrónico basado en sus cuentas personales de Android</li>
<li>Cifrado de fichero: Tremendo diseño nuevo, soporte para cifrado de múltiples ficheros</li>
<li>Nuevos iconos para mostrar estado de clave (por Brennan Novak)</li>
<li>Reparación importante de fallo: La importación de grandes colecciones de claves desde un fichero ahora es posible</li>
<li>Notificación mostrando frases-contraseña en caché</li>
<li>Las claves están conectadas a los contactos de Android</li>
</ul>
<p>Esta versión no sería posible sin el trabajo de Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
<h2>2.7</h2>
<ul>
<li>Purple! (Dominik, Vincent)</li>
<li>Nuevo diseño de vista de clave (Dominik, Vincent)</li>
<li>Nuevos botones de Android planos (Dominik, Vincent)</li>
<li>Reparaciones de la API (Dominik)</li>
<li>Importación de keybase.io (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>Algunas reparaciones para fallos regresivos</li>
</ul>
<h2>2.6</h2>
<ul>
<li>Certificaciones de clave (gracias a Vincent Breitmoser)</li>
<li>Soporte para claves secretas (privadas) parciales de GnuPG (gracias a Vincent Breitmoser)</li>
<li>Nuevo diseño para verificación de firma</li>
<li>Tamaño de clave personalizado (gracias a Greg Witczak)</li>
<li>Repara funcionalidad-compartida desde otras aplicaciones</li>
</ul>
<h2>2.5</h2>
<ul>
<li>Repara el descifrado de ficheros/mensajes OpenPGP simétricos</li>
<li>Pantalla de edición de clave refactorizada (gracias a Ash Hughes)</li>
<li>Nuevo diseño moderno para pantallas de cifrado/descifrado</li>
<li>API de OpenPGP version 3 (múltiples cuentas api, reparaciones internas, búsqueda de clave)</li>
</ul>
<h2>2.4</h2>
<p>¡Gracias a todos los aspirantes del Google Summer of Code 2014 que hicieron que esta versión sea rica en características y libre de fallos!
Además de varios pequeños parches, un número notable de parches están hechos por las siguientes personas (en orden alfabético):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>Nueva lista de claves unificada</li>
<li>Huella de validación de clave (fingerprint) coloreada</li>
<li>Soporte para puertos de servidor de claves</li>
<li>Desactivar la posibilidad de generar claves débiles</li>
<li>Mucho más trabajo interno en la API</li>
<li>Certificar identificaciones de usuario</li>
<li>Consulta al servidor de claves basada en salida legible-por-máquina</li>
<li>Bloquear panel deslizante de navegación en tabletas</li>
<li>Sugerencias para correos electrónicos en la creación de claves</li>
<li>Buscar en listas de claves públicas</li>
<li>Y muchas más mejoras y reparaciones...</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>Reparación crucial para caídas al actualizar desde versiones antiguas</li>
</ul>
<h2>2.3</h2>
<ul>
<li>Eliminar exportación innecesaria de claves públicas al exportar clave secreta (gracias a Ash Hughes)</li>
<li>Repara el establecimiento de fechas de expiración en las claves (gracias a Ash Hughes)</li>
<li>Más reparaciones internas al editar claves (gracias a Ash Hughes)</li>
<li>Consultando servidores de claves directamente desde la pantalla de importación</li>
<li>Repara la composición y el estilo de diálogo de Android 2.2-3.0</li>
<li>Repara caídas en claves con identificaciones de usuario vacías</li>
<li>Repara caídas y listas vacías al volver desde la pantalla de firmado</li>
<li>Bouncy Castle (librería de criptografía) actualizada desde 1,47 a 1.50 y and compilada desde la fuente</li>
<li>Repara la clave de subida desde la pantalla de firmado</li>
</ul>
<h2>2.2</h2>
<ul>
<li>Nuevo diseño con panel deslizante de navegación</li>
<li>Nuevo disño de lista de clave pública</li>
<li>Nueva vista de clave pública</li>
<li>Reparación de fallos para la importación de claves</li>
<li>Certificación-cruzada de clave (gracias a Ash Hughes)</li>
<li>Manejo adecuado de contraseñas UTF-8 (gracias a Ash Hughes)</li>
<li>Primera versiónm con nuevos idiomas (gracias a los contribuidores en Transifex)</li>
<li>Reparado y mejorado el compartido de claves mediante códigos QR </li>
<li>Firma de verificación de paquete para la API</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>Actualizaciones de API, preparación para integrar K-9 Mail</li>
</ul>
<h2>2.1</h2>
<ul>
<li>Muchas reparaciones de fallos</li>
<li>Nueva API para desarrolladores</li>
<li>Reparación de fallo PRNG por Google</li>
</ul>
<h2>2.0</h2>
<ul>
<li>Rediseño completo</li>
<li>Compartido de claves públicas mediante códigos QR y transmisión NFC beam</li>
<li>Firmar claves</li>
<li>Subir claves al servidor</li>
<li>Repara problemas con la importación</li>
<li>New API AIDL</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>Soporte básico de servidor de claves</li>
<li>App2sd</li>
<li>Más opciones para frase-contraseña en caché: 1, 2, 4, 8, horas</li>
<li>Traducciones: Noruego (graciasa, Sander Danielsen), Chino (gracias a Zhang Fredrick)</li>
<li>Reparaciones de fallos</li>
<li>Optimizaciones</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>Problema reparado con la verificación de firma de textos que finalizan con caracter nueva-línea </li>
<li>Más opciones para tiempo de vida en caché de frase-contraseña (20, 40, 60 min)</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Reparada la caída al añadir cuenta en Froyo</li>
<li>Borrado seguro de fichero</li>
<li>Opción para borrar fichero de clave después de importar</li>
<li>Cifrado/descifrado de stream (galería, etc.)</li>
<li>Nuevas opciones (idioma, forzar firmas v3)</li>
<li>Cambios de interfaz</li>
<li>Reparaciones de fallos</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>Traducción al alemán e italiano</li>
<li>Paquete mucho más pequeño, debido a fuentes BC reducidas</li>
<li>Nuevas preferencias de GUI</li>
<li>Ajuste de composición para localización</li>
<li>Reparación de fallo de firma</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>Reparado otro fallo causado por algún fallo SDK con constructor de consultas</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>Reparadas caídas durante el cifrado/firmado y posiblemente exportación de claves</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>Listas de claves filtrables</li>
<li>Pre-selección más inteligente de claves de cifrado</li>
<li>Nuevo objeto Intent que maneja VIEW y SEND (ver y enviar), permite que los ficheros sean cifrados/descifrados fuera de los administradores de ficheros</li>
<li>Reparaciones y características adicionales (preselección de claves) para K-9 Mail, nueva compilación beta disponible</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>El listado de cuentas de GMail estaba roto en la 1.0.0, reparado de nuevo</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>Integración de K-9 Mail, compilación beta soportando APG de K-9 Mail</li>
<li>Soporte para más administradores de ficheros (incluyendo ASTRO)</li>
<li>Traducción al esloveno</li>
<li>Nueva base de datos, mucho más rápidas, con menor uso de memoria</li>
<li>Definidos objetos Intent, y proveedores de contenidos para otras aplicaciones</li>
<li>Reparaciones de fallos</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Diseño estilo Material
* Integración de QR Scanner (se requieren nuevos permisos)
* Asistente de creación de clave mejorado
* Repara contactos perdidos después de la sincronización
* Requiere Android 4
* Pantalla de clave rediseñada
* Simplifica las preferencias de criptografía, mejor selección de algoritmos de cifrado seguro
* API: Firmas desacopladas, selección libre de clave de firmado...
* Reparación: Algunas claves válidas se mostraron revocadas o caducadas
* No acepte algo firmado por subclaves caducadas o revocadas
* Soporte Keybase.io en la vista avanzada
## 3.1.2
* Repara la exportación de claves a ficheros (ahora de verdad)
## 3.1.1
* Repara la exportación de claves a ficheros (se escribían parcialmente)
* Repara un fallo con caída en Android 2.3
## 3.1
* Repara un fallo con caída en Android 5
* Nueva pantalla de certificación
* Intercambio seguro directamente desde la lista de claves (librería SafeSlinger)
* Nuevo control de flujo del programa QR Code
* Pantalla de descifrado rediseñada
* Nuevo uso del icono y colores
* Repara la importación de clave secretas (privadas) desde Symantec Encryption Desktop
* Las identificaciones de subclaves sobre Yubikeys ahora están comprobadas correctamente
## 3.0.1
* Mejor manejo de importaciones de claves largas
* Selección de subclaves mejorada
## 3.0
* ¡Soporte completo para generación de firma y descifrado de Yubikey!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>¿Cómo activo OpenKeychain in K-9 Mail?</h2>
<p>Para utilizar OpenKeychain con K-9 Mail, querrá seguir estos pasos:</p>
<ol>
<li>Abra K-9 Mail y realice una pulsación larga en la cuenta con la que quiera utilizar OpenKeychain.</li>
<li>Seleccione "Configuración de cuenta", deplácese al fondo del todo y haga clic en "Criptografía".</li>
<li>Haga clic en "Proveedor OpenPGP" y de la lista seleccione OpenKeychain.</li>
</ol>
<h2>¡He encontrado un bug en OpenKeychain!</h2>
<p>Por favor, informa de errores usando el <a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">seguimiento de incidencias de OpenKeychain</a>.</p>
<h2>Aportar</h2>
<p>Si quieres ayudarnos con el desarrollo de OpenKeychain aportando código <a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">sigue nuestra pequeña guía en Github</a>.</p>
<h2>Traducciones</h2>
<p>¡Ayúdanos a traducir OpenKeychain! Todo el mundo es bienvenido en <a href="https://www.transifex.com/projects/p/openpgp-keychain/">Transifex - OpenKeychain</a>.</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## ¿Cómo activo OpenKeychain en K-9 Mail?
Para usar OpenKeychain con K-9 Mail, deberá seguir estos pasos:
1. Abra K-9 Mail y realice una pulsación larga sobre la cuenta con la que quiera usar OpenKeychain.
2. Seleccione "Configuración de cuenta", desplácese hasta el fondo y pulse "Criptografía".
3. Haga clic sobre "Proveedor OpenPGP" y seleccione OpenKeychain de la lista.
## ¡Encontré un fallo en OpenKeychain!
Por favor informe del fallo usando el [rastreador de fallos de OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribuir
Si quiere ayudarnos a desarrollar OpenKeychain contribuyendo con código [siga nuestra pequeña guía en GitHub](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Traducciones
¡Ayude a traducir OpenKeychain! Todos pueden participar en [OpenKeychain en Transifex] (https://www.transifex.com/projects/p/openpgp-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> is an OpenPGP implementation for Android.</p>
<p>License: GPLv3+</p>
<h2>Developers</h2>
<ul>
<li>Dominik Schürmann (Maintainer)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Libraries</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (MIT X11 License)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">SafeSlinger Exchange library</a> (MIT License)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Support Libraries</a> (Apache License v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Apache License v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Apache License v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Apache License v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Apache License v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Apache License v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Apache License v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (Material Design)</a> (Apache License v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Apache License v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (MIT License)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Apache License v2)</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) is an OpenPGP implementation for Android.
License: GPLv3+
## Developers
* Dominik Schürmann (Maintainer)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Libraries
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (MIT X11 License)
* [SafeSlinger Exchange library](https://github.com/SafeSlingerProject/exchange-android) (MIT License)
* [Android Support Libraries](http://developer.android.com/tools/support-library/index.html) (Apache License v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Apache License v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Apache License v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Apache License v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Apache License v2)
* [ZXing](https://github.com/zxing/zxing) (Apache License v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Apache License v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Material Design)</a> (Apache License v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Apache License v2)
* [Snackbar](https://github.com/nispok/snackbar) (MIT License)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Apache License v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Apache License v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Apache License v2)

View File

@@ -0,0 +1,27 @@
## Key Confirmation
Without confirmation, you cannot be sure if a key really corresponds to a specific person.
The most simplest way to confirm a key is by scanning the QR Code or exchanging it via NFC.
To confirm keys between more than two persons, we suggest to use the key exchange method available for your keys.
## Key Status
<img src="status_signature_verified_cutout_24dp"/>
Confirmed: You have already confirmed this key, e.g., by scanning the QR Code.
<img src="status_signature_unverified_cutout_24dp"/>
Unconfirmed: This key has not been confirmed yet. You cannot be sure if the key really corresponds to a specific person.
<img src="status_signature_expired_cutout_24dp"/>
Expired: This key is no longer valid. Only the owner can extend its validity.
<img src="status_signature_revoked_cutout_24dp"/>
Revoked: This key is no longer valid. It has been revoked by its owner.
## Advanced Information
A "key confirmation" in OpenKeychain is implemented by creating a certification according to the OpenPGP standard.
This certification is a ["generic certification (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) described in the standard by:
"The issuer of this certification does not make any particular assertion as to how well the certifier has checked that the owner of the key is in fact the person described by the User ID."
Traditionally, certifications (also with higher certification levels, such as "positive certifications" (0x13)) are organized in OpenPGP's Web of Trust.
Our model of key confirmation is a much simpler concept to avoid common usability problems related to this Web of Trust.
We assume that keys are verified only to a certain degree that is still usable enough to be executed "on the go".
We also do not implement (potentially transitive) trust signatures or an ownertrust database like in GnuPG.
Furthermore, keys which contain at least one user ID certified by a trusted key will be marked as "confirmed" in the key listings.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>Fix key export to files (now for real)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>Fix key export to files (they were written partially)</li>
<li>Fix crash on Android 2.3</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Fix crash on Android 5</li>
<li>New certify screen</li>
<li>Secure Exchange directly from key list (SafeSlinger library)</li>
<li>New QR Code program flow</li>
<li>Redesigned decrypt screen</li>
<li>New icon usage and colors</li>
<li>Fix import of secret keys from Symantec Encryption Desktop</li>
<li>Subkey IDs on Yubikeys are now checked correctly</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>Better handling of large key imports</li>
<li>Improved subkey selection</li>
</ul>
<h2>3.0</h2>
<ul>
<li>Full support for Yubikey signature generation and decryption!</li>
<li>Propose installable compatible apps in apps list</li>
<li>New design for decryption screens</li>
<li>Many fixes for key import, also fixes stripped keys</li>
<li>Honor and display key authenticate flags</li>
<li>User interface to generate custom keys</li>
<li>Fixing user id revocation certificates</li>
<li>New cloud search (searches over traditional keyservers and keybase.io)</li>
<li>Support for stripping keys inside OpenKeychain</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>Fix keys broken in 2.9.1</li>
<li>Yubikey decryption now working via API</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>Split encrypt screen into two</li>
<li>Fix key flags handling (now supporting Mailvelope 0.7 keys)</li>
<li>Improved passphrase handling</li>
<li>Key sharing via SafeSlinger</li>
<li>Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain</li>
<li>Fix usage of stripped keys</li>
<li>SHA256 as default for compatibility</li>
<li>Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>OpenPGP API now handles revoked/expired keys and returns all user ids</li>
</ul>
<h2>2.9</h2>
<ul>
<li>Fixing crashes introduced in v2.8</li>
<li>Experimental ECC support</li>
<li>Experimental Yubikey support (signing-only with imported keys)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>So many bugs have been fixed in this release that we focus on the main new features</li>
<li>Key edit: awesome new design, key revocation</li>
<li>Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records</li>
<li>New first time screen</li>
<li>New key creation screen: autocompletion of name and email based on your personal Android accounts</li>
<li>File encryption: awesome new design, support for encrypting multiple files</li>
<li>New icons to show status of key (by Brennan Novak)</li>
<li>Important bug fix: Importing of large key collections from a file is now possible</li>
<li>Notification showing cached passphrases</li>
<li>Keys are connected to Android's contacts</li>
</ul>
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
<h2>2.7</h2>
<ul>
<li>Purple! (Dominik, Vincent)</li>
<li>New key view design (Dominik, Vincent)</li>
<li>New flat Android buttons (Dominik, Vincent)</li>
<li>API fixes (Dominik)</li>
<li>Keybase.io import (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>Some fixes for regression bugs</li>
</ul>
<h2>2.6</h2>
<ul>
<li>Key certifications (thanks to Vincent Breitmoser)</li>
<li>Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)</li>
<li>New design for signature verification</li>
<li>Custom key length (thanks to Greg Witczak)</li>
<li>Fix share-functionality from other apps</li>
</ul>
<h2>2.5</h2>
<ul>
<li>Fix decryption of symmetric OpenPGP messages/files</li>
<li>Refactored key edit screen (thanks to Ash Hughes)</li>
<li>New modern design for encrypt/decrypt screens</li>
<li>OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)</li>
</ul>
<h2>2.4</h2>
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>New unified key list</li>
<li>Colorized key fingerprint</li>
<li>Support for keyserver ports</li>
<li>Deactivate possibility to generate weak keys</li>
<li>Much more internal work on the API</li>
<li>Certify user ids</li>
<li>Keyserver query based on machine-readable output</li>
<li>Lock navigation drawer on tablets</li>
<li>Suggestions for emails on creation of keys</li>
<li>Search in public key lists</li>
<li>And much more improvements and fixes…</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>Hotfix for crash when upgrading from old versions</li>
</ul>
<h2>2.3</h2>
<ul>
<li>Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)</li>
<li>Fix setting expiry dates on keys (thanks to Ash Hughes)</li>
<li>More internal fixes when editing keys (thanks to Ash Hughes)</li>
<li>Querying keyservers directly from the import screen</li>
<li>Fix layout and dialog style on Android 2.2-3.0</li>
<li>Fix crash on keys with empty user ids</li>
<li>Fix crash and empty lists when coming back from signing screen</li>
<li>Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source</li>
<li>Fix upload of key from signing screen</li>
</ul>
<h2>2.2</h2>
<ul>
<li>New design with navigation drawer</li>
<li>New public key list design</li>
<li>New public key view</li>
<li>Bug fixes for importing of keys</li>
<li>Key cross-certification (thanks to Ash Hughes)</li>
<li>Handle UTF-8 passwords properly (thanks to Ash Hughes)</li>
<li>First version with new languages (thanks to the contributors on Transifex)</li>
<li>Sharing of keys via QR Codes fixed and improved</li>
<li>Package signature verification for API</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>API Updates, preparation for K-9 Mail integration</li>
</ul>
<h2>2.1</h2>
<ul>
<li>Lots of bug fixes</li>
<li>New API for developers</li>
<li>PRNG bug fix by Google</li>
</ul>
<h2>2.0</h2>
<ul>
<li>Complete redesign</li>
<li>Share public keys via QR codes, NFC beam</li>
<li>Sign keys</li>
<li>Upload keys to server</li>
<li>Fixes import issues</li>
<li>New AIDL API</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>Basic keyserver support</li>
<li>App2sd</li>
<li>More choices for passphrase cache: 1, 2, 4, 8, hours</li>
<li>Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)</li>
<li>Bugfixes</li>
<li>Optimizations</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>Fixed problem with signature verification of texts with trailing newline</li>
<li>More options for passphrase cache time to live (20, 40, 60 mins)</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Account adding crash on Froyo fixed</li>
<li>Secure file deletion</li>
<li>Option to delete key file after import</li>
<li>Stream encryption/decryption (gallery, etc.)</li>
<li>New options (language, force v3 signatures)</li>
<li>Interface changes</li>
<li>Bugfixes</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>German and Italian translation</li>
<li>Much smaller package, due to reduced BC sources</li>
<li>New preferences GUI</li>
<li>Layout adjustment for localization</li>
<li>Signature bugfix</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>Fixed another crash caused by some SDK bug with query builder</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>Fixed crashes during encryption/signing and possibly key export</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>Filterable key lists</li>
<li>Smarter pre-selection of encryption keys</li>
<li>New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers</li>
<li>Fixes and additional features (key preselection) for K-9 Mail, new beta build available</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>GMail account listing was broken in 1.0.0, fixed again</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>K-9 Mail integration, APG supporting beta build of K-9 Mail</li>
<li>Support of more file managers (including ASTRO)</li>
<li>Slovenian translation</li>
<li>New database, much faster, less memory usage</li>
<li>Defined Intents and content provider for other apps</li>
<li>Bugfixes</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integration of QR Scanner (New permissions required)
* Improved key creation wizard
* Fix missing contacts after sync
* Requires Android 4
* Redesigned key screen
* Simplify crypto preferences, better selection of secure ciphers
* API: Detached signatures, free selection of signing key,...
* Fix: Some valid keys were shown revoked or expired
* Don't accept signatures by expired or revoked subkeys
* Keybase.io support in advanced view
## 3.1.2
* Fix key export to files (now for real)
## 3.1.1
* Fix key export to files (they were written partially)
* Fix crash on Android 2.3
## 3.1
* Fix crash on Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Better handling of large key imports
* Improved subkey selection
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>How do I activate OpenKeychain in K-9 Mail?</h2>
<p>To use OpenKeychain with K-9 Mail, you want to follow these steps:</p>
<ol>
<li>Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.</li>
<li>Select "Account settings" and scroll to the very bottom and click "Cryptography".</li>
<li>Click on "OpenPGP Provider" and select OpenKeychain from the list.</li>
</ol>
<h2>I found a bug in OpenKeychain!</h2>
<p>Please report the bug using the <a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">issue tracker of OpenKeychain</a>.</p>
<h2>Contribute</h2>
<p>If you want to help us developing OpenKeychain by contributing code <a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">follow our small guide on Github</a>.</p>
<h2>Translations</h2>
<p>Help translating OpenKeychain! Everybody can participate at <a href="https://www.transifex.com/projects/p/openpgp-keychain/">OpenKeychain on Transifex</a>.</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## How do I activate OpenKeychain in K-9 Mail?
To use OpenKeychain with K-9 Mail, you want to follow these steps:
1. Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.
2. Select "Account settings" and scroll to the very bottom and click "Cryptography".
3. Click on "OpenPGP Provider" and select OpenKeychain from the list.
## I found a bug in OpenKeychain!
Please report the bug using the [issue tracker of OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribute
If you want to help us developing OpenKeychain by contributing code [follow our small guide on Github](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Translations
Help translating OpenKeychain! Everybody can participate at [OpenKeychain on Transifex](https://www.transifex.com/projects/p/openpgp-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> Android-rako OpenPGP inplemetazio bat da.</p>
<p>Baimena: GPLv3+</p>
<h2>Garatzaileak</h2>
<ul>
<li>Dominik Schürmann (Mantentzailea)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Liburutegiak</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (MIT X11 Baimena)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">SafeSlinger Exchange library</a> (MIT Baimena)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Support Libraries</a> (Apache License v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Apache Baimena v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Apache Baimena v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Apache Baimena v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Apache Baimena v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Apache License v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Apache License v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (Material Design)</a> (Apache License v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Apache License v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (MIT License)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Apache License v2)</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) is an OpenPGP implementation for Android.
License: GPLv3+
## Developers
* Dominik Schürmann (Maintainer)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Libraries
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (MIT X11 License)
* [SafeSlinger Exchange library](https://github.com/SafeSlingerProject/exchange-android) (MIT License)
* [Android Support Libraries](http://developer.android.com/tools/support-library/index.html) (Apache License v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Apache License v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Apache License v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Apache License v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Apache License v2)
* [ZXing](https://github.com/zxing/zxing) (Apache License v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Apache License v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Material Design)</a> (Apache License v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Apache License v2)
* [Snackbar](https://github.com/nispok/snackbar) (MIT License)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Apache License v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Apache License v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Apache License v2)

View File

@@ -0,0 +1,27 @@
## Key Confirmation
Without confirmation, you cannot be sure if a key really corresponds to a specific person.
The most simplest way to confirm a key is by scanning the QR Code or exchanging it via NFC.
To confirm keys between more than two persons, we suggest to use the key exchange method available for your keys.
## Key Status
<img src="status_signature_verified_cutout_24dp"/>
Confirmed: You have already confirmed this key, e.g., by scanning the QR Code.
<img src="status_signature_unverified_cutout_24dp"/>
Unconfirmed: This key has not been confirmed yet. You cannot be sure if the key really corresponds to a specific person.
<img src="status_signature_expired_cutout_24dp"/>
Expired: This key is no longer valid. Only the owner can extend its validity.
<img src="status_signature_revoked_cutout_24dp"/>
Revoked: This key is no longer valid. It has been revoked by its owner.
## Advanced Information
A "key confirmation" in OpenKeychain is implemented by creating a certification according to the OpenPGP standard.
This certification is a ["generic certification (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) described in the standard by:
"The issuer of this certification does not make any particular assertion as to how well the certifier has checked that the owner of the key is in fact the person described by the User ID."
Traditionally, certifications (also with higher certification levels, such as "positive certifications" (0x13)) are organized in OpenPGP's Web of Trust.
Our model of key confirmation is a much simpler concept to avoid common usability problems related to this Web of Trust.
We assume that keys are verified only to a certain degree that is still usable enough to be executed "on the go".
We also do not implement (potentially transitive) trust signatures or an ownertrust database like in GnuPG.
Furthermore, keys which contain at least one user ID certified by a trusted key will be marked as "confirmed" in the key listings.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>Fix key export to files (now for real)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>Fix key export to files (they were written partially)</li>
<li>Fix crash on Android 2.3</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Fix crash on Android 5</li>
<li>New certify screen</li>
<li>Secure Exchange directly from key list (SafeSlinger library)</li>
<li>New QR Code program flow</li>
<li>Redesigned decrypt screen</li>
<li>New icon usage and colors</li>
<li>Fix import of secret keys from Symantec Encryption Desktop</li>
<li>Subkey IDs on Yubikeys are now checked correctly</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>Better handling of large key imports</li>
<li>Improved subkey selection</li>
</ul>
<h2>3.0</h2>
<ul>
<li>Full support for Yubikey signature generation and decryption!</li>
<li>Propose installable compatible apps in apps list</li>
<li>New design for decryption screens</li>
<li>Many fixes for key import, also fixes stripped keys</li>
<li>Honor and display key authenticate flags</li>
<li>User interface to generate custom keys</li>
<li>Fixing user id revocation certificates</li>
<li>New cloud search (searches over traditional keyservers and keybase.io)</li>
<li>Support for stripping keys inside OpenKeychain</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>Fix keys broken in 2.9.1</li>
<li>Yubikey decryption now working via API</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>Split encrypt screen into two</li>
<li>Fix key flags handling (now supporting Mailvelope 0.7 keys)</li>
<li>Improved passphrase handling</li>
<li>Key sharing via SafeSlinger</li>
<li>Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain</li>
<li>Fix usage of stripped keys</li>
<li>SHA256 as default for compatibility</li>
<li>Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>OpenPGP API now handles revoked/expired keys and returns all user ids</li>
</ul>
<h2>2.9</h2>
<ul>
<li>Fixing crashes introduced in v2.8</li>
<li>Experimental ECC support</li>
<li>Experimental Yubikey support (signing-only with imported keys)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>So many bugs have been fixed in this release that we focus on the main new features</li>
<li>Key edit: awesome new design, key revocation</li>
<li>Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records</li>
<li>New first time screen</li>
<li>New key creation screen: autocompletion of name and email based on your personal Android accounts</li>
<li>File encryption: awesome new design, support for encrypting multiple files</li>
<li>New icons to show status of key (by Brennan Novak)</li>
<li>Important bug fix: Importing of large key collections from a file is now possible</li>
<li>Notification showing cached passphrases</li>
<li>Keys are connected to Android's contacts</li>
</ul>
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
<h2>2.7</h2>
<ul>
<li>Purple! (Dominik, Vincent)</li>
<li>New key view design (Dominik, Vincent)</li>
<li>New flat Android buttons (Dominik, Vincent)</li>
<li>API fixes (Dominik)</li>
<li>Keybase.io import (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>Some fixes for regression bugs</li>
</ul>
<h2>2.6</h2>
<ul>
<li>Key certifications (thanks to Vincent Breitmoser)</li>
<li>Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)</li>
<li>New design for signature verification</li>
<li>Custom key length (thanks to Greg Witczak)</li>
<li>Fix share-functionality from other apps</li>
</ul>
<h2>2.5</h2>
<ul>
<li>Fix decryption of symmetric OpenPGP messages/files</li>
<li>Refactored key edit screen (thanks to Ash Hughes)</li>
<li>New modern design for encrypt/decrypt screens</li>
<li>OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)</li>
</ul>
<h2>2.4</h2>
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>New unified key list</li>
<li>Colorized key fingerprint</li>
<li>Support for keyserver ports</li>
<li>Deactivate possibility to generate weak keys</li>
<li>Much more internal work on the API</li>
<li>Certify user ids</li>
<li>Keyserver query based on machine-readable output</li>
<li>Lock navigation drawer on tablets</li>
<li>Suggestions for emails on creation of keys</li>
<li>Search in public key lists</li>
<li>And much more improvements and fixes…</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>Hotfix for crash when upgrading from old versions</li>
</ul>
<h2>2.3</h2>
<ul>
<li>Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)</li>
<li>Fix setting expiry dates on keys (thanks to Ash Hughes)</li>
<li>More internal fixes when editing keys (thanks to Ash Hughes)</li>
<li>Querying keyservers directly from the import screen</li>
<li>Fix layout and dialog style on Android 2.2-3.0</li>
<li>Fix crash on keys with empty user ids</li>
<li>Fix crash and empty lists when coming back from signing screen</li>
<li>Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source</li>
<li>Fix upload of key from signing screen</li>
</ul>
<h2>2.2</h2>
<ul>
<li>New design with navigation drawer</li>
<li>New public key list design</li>
<li>New public key view</li>
<li>Bug fixes for importing of keys</li>
<li>Key cross-certification (thanks to Ash Hughes)</li>
<li>Handle UTF-8 passwords properly (thanks to Ash Hughes)</li>
<li>First version with new languages (thanks to the contributors on Transifex)</li>
<li>Sharing of keys via QR Codes fixed and improved</li>
<li>Package signature verification for API</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>API Updates, preparation for K-9 Mail integration</li>
</ul>
<h2>2.1</h2>
<ul>
<li>Lots of bug fixes</li>
<li>New API for developers</li>
<li>PRNG bug fix by Google</li>
</ul>
<h2>2.0</h2>
<ul>
<li>Complete redesign</li>
<li>Share public keys via QR codes, NFC beam</li>
<li>Sign keys</li>
<li>Upload keys to server</li>
<li>Fixes import issues</li>
<li>New AIDL API</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>Basic keyserver support</li>
<li>App2sd</li>
<li>More choices for passphrase cache: 1, 2, 4, 8, hours</li>
<li>Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)</li>
<li>Bugfixes</li>
<li>Optimizations</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>Fixed problem with signature verification of texts with trailing newline</li>
<li>More options for passphrase cache time to live (20, 40, 60 mins)</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Account adding crash on Froyo fixed</li>
<li>Secure file deletion</li>
<li>Option to delete key file after import</li>
<li>Stream encryption/decryption (gallery, etc.)</li>
<li>New options (language, force v3 signatures)</li>
<li>Interface changes</li>
<li>Bugfixes</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>German and Italian translation</li>
<li>Much smaller package, due to reduced BC sources</li>
<li>New preferences GUI</li>
<li>Layout adjustment for localization</li>
<li>Signature bugfix</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>Fixed another crash caused by some SDK bug with query builder</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>Fixed crashes during encryption/signing and possibly key export</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>Filterable key lists</li>
<li>Smarter pre-selection of encryption keys</li>
<li>New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers</li>
<li>Fixes and additional features (key preselection) for K-9 Mail, new beta build available</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>GMail account listing was broken in 1.0.0, fixed again</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>K-9 Mail integration, APG supporting beta build of K-9 Mail</li>
<li>Support of more file managers (including ASTRO)</li>
<li>Slovenian translation</li>
<li>New database, much faster, less memory usage</li>
<li>Defined Intents and content provider for other apps</li>
<li>Bugfixes</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integration of QR Scanner (New permissions required)
* Improved key creation wizard
* Fix missing contacts after sync
* Requires Android 4
* Redesigned key screen
* Simplify crypto preferences, better selection of secure ciphers
* API: Detached signatures, free selection of signing key,...
* Fix: Some valid keys were shown revoked or expired
* Don't accept signatures by expired or revoked subkeys
* Keybase.io support in advanced view
## 3.1.2
* Fix key export to files (now for real)
## 3.1.1
* Fix key export to files (they were written partially)
* Fix crash on Android 2.3
## 3.1
* Fix crash on Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Better handling of large key imports
* Improved subkey selection
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>How do I activate OpenKeychain in K-9 Mail?</h2>
<p>To use OpenKeychain with K-9 Mail, you want to follow these steps:</p>
<ol>
<li>Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.</li>
<li>Select "Account settings" and scroll to the very bottom and click "Cryptography".</li>
<li>Click on "OpenPGP Provider" and select OpenKeychain from the list.</li>
</ol>
<h2>Akats bat aurkitu dut OpenKeychain-en!</h2>
<p>Please report the bug using the <a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">issue tracker of OpenKeychain</a>.</p>
<h2>Lagundu</h2>
<p>If you want to help us developing OpenKeychain by contributing code <a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">follow our small guide on Github</a>.</p>
<h2>Itzulpenak</h2>
<p>Lagundu OpenKeychain itzultzen! Edonork eskuhartu dezake hemen <a href="https://www.transifex.com/projects/p/openpgp-keychain/">OpenKeychainTransifex-en</a>.</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## How do I activate OpenKeychain in K-9 Mail?
To use OpenKeychain with K-9 Mail, you want to follow these steps:
1. Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.
2. Select "Account settings" and scroll to the very bottom and click "Cryptography".
3. Click on "OpenPGP Provider" and select OpenKeychain from the list.
## I found a bug in OpenKeychain!
Please report the bug using the [issue tracker of OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribute
If you want to help us developing OpenKeychain by contributing code [follow our small guide on Github](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Translations
Help translating OpenKeychain! Everybody can participate at [OpenKeychain on Transifex](https://www.transifex.com/projects/p/openpgp-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> is an OpenPGP implementation for Android.</p>
<p>License: GPLv3+</p>
<h2>Developers</h2>
<ul>
<li>Dominik Schürmann (Maintainer)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Libraries</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (MIT X11 License)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">SafeSlinger Exchange library</a> (MIT License)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Support Libraries</a> (Apache License v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Apache License v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Apache License v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Apache License v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Apache License v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Apache License v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Apache License v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (Material Design)</a> (Apache License v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Apache License v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (MIT License)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Apache License v2)</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) is an OpenPGP implementation for Android.
License: GPLv3+
## Developers
* Dominik Schürmann (Maintainer)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Libraries
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (MIT X11 License)
* [SafeSlinger Exchange library](https://github.com/SafeSlingerProject/exchange-android) (MIT License)
* [Android Support Libraries](http://developer.android.com/tools/support-library/index.html) (Apache License v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Apache License v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Apache License v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Apache License v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Apache License v2)
* [ZXing](https://github.com/zxing/zxing) (Apache License v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Apache License v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Material Design)</a> (Apache License v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Apache License v2)
* [Snackbar](https://github.com/nispok/snackbar) (MIT License)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Apache License v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Apache License v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Apache License v2)

View File

@@ -0,0 +1,27 @@
## Key Confirmation
Without confirmation, you cannot be sure if a key really corresponds to a specific person.
The most simplest way to confirm a key is by scanning the QR Code or exchanging it via NFC.
To confirm keys between more than two persons, we suggest to use the key exchange method available for your keys.
## Key Status
<img src="status_signature_verified_cutout_24dp"/>
Confirmed: You have already confirmed this key, e.g., by scanning the QR Code.
<img src="status_signature_unverified_cutout_24dp"/>
Unconfirmed: This key has not been confirmed yet. You cannot be sure if the key really corresponds to a specific person.
<img src="status_signature_expired_cutout_24dp"/>
Expired: This key is no longer valid. Only the owner can extend its validity.
<img src="status_signature_revoked_cutout_24dp"/>
Revoked: This key is no longer valid. It has been revoked by its owner.
## Advanced Information
A "key confirmation" in OpenKeychain is implemented by creating a certification according to the OpenPGP standard.
This certification is a ["generic certification (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) described in the standard by:
"The issuer of this certification does not make any particular assertion as to how well the certifier has checked that the owner of the key is in fact the person described by the User ID."
Traditionally, certifications (also with higher certification levels, such as "positive certifications" (0x13)) are organized in OpenPGP's Web of Trust.
Our model of key confirmation is a much simpler concept to avoid common usability problems related to this Web of Trust.
We assume that keys are verified only to a certain degree that is still usable enough to be executed "on the go".
We also do not implement (potentially transitive) trust signatures or an ownertrust database like in GnuPG.
Furthermore, keys which contain at least one user ID certified by a trusted key will be marked as "confirmed" in the key listings.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>Fix key export to files (now for real)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>Fix key export to files (they were written partially)</li>
<li>Fix crash on Android 2.3</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Fix crash on Android 5</li>
<li>New certify screen</li>
<li>Secure Exchange directly from key list (SafeSlinger library)</li>
<li>New QR Code program flow</li>
<li>Redesigned decrypt screen</li>
<li>New icon usage and colors</li>
<li>Fix import of secret keys from Symantec Encryption Desktop</li>
<li>Subkey IDs on Yubikeys are now checked correctly</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>Better handling of large key imports</li>
<li>Improved subkey selection</li>
</ul>
<h2>3.0</h2>
<ul>
<li>Full support for Yubikey signature generation and decryption!</li>
<li>Propose installable compatible apps in apps list</li>
<li>New design for decryption screens</li>
<li>Many fixes for key import, also fixes stripped keys</li>
<li>Honor and display key authenticate flags</li>
<li>User interface to generate custom keys</li>
<li>Fixing user id revocation certificates</li>
<li>New cloud search (searches over traditional keyservers and keybase.io)</li>
<li>Support for stripping keys inside OpenKeychain</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>Fix keys broken in 2.9.1</li>
<li>Yubikey decryption now working via API</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>Split encrypt screen into two</li>
<li>Fix key flags handling (now supporting Mailvelope 0.7 keys)</li>
<li>Improved passphrase handling</li>
<li>Key sharing via SafeSlinger</li>
<li>Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain</li>
<li>Fix usage of stripped keys</li>
<li>SHA256 as default for compatibility</li>
<li>Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>OpenPGP API now handles revoked/expired keys and returns all user ids</li>
</ul>
<h2>2.9</h2>
<ul>
<li>Fixing crashes introduced in v2.8</li>
<li>Experimental ECC support</li>
<li>Experimental Yubikey support (signing-only with imported keys)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>So many bugs have been fixed in this release that we focus on the main new features</li>
<li>Key edit: awesome new design, key revocation</li>
<li>Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records</li>
<li>New first time screen</li>
<li>New key creation screen: autocompletion of name and email based on your personal Android accounts</li>
<li>File encryption: awesome new design, support for encrypting multiple files</li>
<li>New icons to show status of key (by Brennan Novak)</li>
<li>Important bug fix: Importing of large key collections from a file is now possible</li>
<li>Notification showing cached passphrases</li>
<li>Keys are connected to Android's contacts</li>
</ul>
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
<h2>2.7</h2>
<ul>
<li>Purple! (Dominik, Vincent)</li>
<li>New key view design (Dominik, Vincent)</li>
<li>New flat Android buttons (Dominik, Vincent)</li>
<li>API fixes (Dominik)</li>
<li>Keybase.io import (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>Some fixes for regression bugs</li>
</ul>
<h2>2.6</h2>
<ul>
<li>Key certifications (thanks to Vincent Breitmoser)</li>
<li>Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)</li>
<li>New design for signature verification</li>
<li>Custom key length (thanks to Greg Witczak)</li>
<li>Fix share-functionality from other apps</li>
</ul>
<h2>2.5</h2>
<ul>
<li>Fix decryption of symmetric OpenPGP messages/files</li>
<li>Refactored key edit screen (thanks to Ash Hughes)</li>
<li>New modern design for encrypt/decrypt screens</li>
<li>OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)</li>
</ul>
<h2>2.4</h2>
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>New unified key list</li>
<li>Colorized key fingerprint</li>
<li>Support for keyserver ports</li>
<li>Deactivate possibility to generate weak keys</li>
<li>Much more internal work on the API</li>
<li>Certify user ids</li>
<li>Keyserver query based on machine-readable output</li>
<li>Lock navigation drawer on tablets</li>
<li>Suggestions for emails on creation of keys</li>
<li>Search in public key lists</li>
<li>And much more improvements and fixes…</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>Hotfix for crash when upgrading from old versions</li>
</ul>
<h2>2.3</h2>
<ul>
<li>Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)</li>
<li>Fix setting expiry dates on keys (thanks to Ash Hughes)</li>
<li>More internal fixes when editing keys (thanks to Ash Hughes)</li>
<li>Querying keyservers directly from the import screen</li>
<li>Fix layout and dialog style on Android 2.2-3.0</li>
<li>Fix crash on keys with empty user ids</li>
<li>Fix crash and empty lists when coming back from signing screen</li>
<li>Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source</li>
<li>Fix upload of key from signing screen</li>
</ul>
<h2>2.2</h2>
<ul>
<li>New design with navigation drawer</li>
<li>New public key list design</li>
<li>New public key view</li>
<li>Bug fixes for importing of keys</li>
<li>Key cross-certification (thanks to Ash Hughes)</li>
<li>Handle UTF-8 passwords properly (thanks to Ash Hughes)</li>
<li>First version with new languages (thanks to the contributors on Transifex)</li>
<li>Sharing of keys via QR Codes fixed and improved</li>
<li>Package signature verification for API</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>API Updates, preparation for K-9 Mail integration</li>
</ul>
<h2>2.1</h2>
<ul>
<li>Lots of bug fixes</li>
<li>New API for developers</li>
<li>PRNG bug fix by Google</li>
</ul>
<h2>2.0</h2>
<ul>
<li>Complete redesign</li>
<li>Share public keys via QR codes, NFC beam</li>
<li>Sign keys</li>
<li>Upload keys to server</li>
<li>Fixes import issues</li>
<li>New AIDL API</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>Basic keyserver support</li>
<li>App2sd</li>
<li>More choices for passphrase cache: 1, 2, 4, 8, hours</li>
<li>Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)</li>
<li>Bugfixes</li>
<li>Optimizations</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>Fixed problem with signature verification of texts with trailing newline</li>
<li>More options for passphrase cache time to live (20, 40, 60 mins)</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Account adding crash on Froyo fixed</li>
<li>Secure file deletion</li>
<li>Option to delete key file after import</li>
<li>Stream encryption/decryption (gallery, etc.)</li>
<li>New options (language, force v3 signatures)</li>
<li>Interface changes</li>
<li>Bugfixes</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>German and Italian translation</li>
<li>Much smaller package, due to reduced BC sources</li>
<li>New preferences GUI</li>
<li>Layout adjustment for localization</li>
<li>Signature bugfix</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>Fixed another crash caused by some SDK bug with query builder</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>Fixed crashes during encryption/signing and possibly key export</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>Filterable key lists</li>
<li>Smarter pre-selection of encryption keys</li>
<li>New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers</li>
<li>Fixes and additional features (key preselection) for K-9 Mail, new beta build available</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>GMail account listing was broken in 1.0.0, fixed again</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>K-9 Mail integration, APG supporting beta build of K-9 Mail</li>
<li>Support of more file managers (including ASTRO)</li>
<li>Slovenian translation</li>
<li>New database, much faster, less memory usage</li>
<li>Defined Intents and content provider for other apps</li>
<li>Bugfixes</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integration of QR Scanner (New permissions required)
* Improved key creation wizard
* Fix missing contacts after sync
* Requires Android 4
* Redesigned key screen
* Simplify crypto preferences, better selection of secure ciphers
* API: Detached signatures, free selection of signing key,...
* Fix: Some valid keys were shown revoked or expired
* Don't accept signatures by expired or revoked subkeys
* Keybase.io support in advanced view
## 3.1.2
* Fix key export to files (now for real)
## 3.1.1
* Fix key export to files (they were written partially)
* Fix crash on Android 2.3
## 3.1
* Fix crash on Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Better handling of large key imports
* Improved subkey selection
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>How do I activate OpenKeychain in K-9 Mail?</h2>
<p>To use OpenKeychain with K-9 Mail, you want to follow these steps:</p>
<ol>
<li>Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.</li>
<li>Select "Account settings" and scroll to the very bottom and click "Cryptography".</li>
<li>Click on "OpenPGP Provider" and select OpenKeychain from the list.</li>
</ol>
<h2>I found a bug in OpenKeychain!</h2>
<p>Please report the bug using the <a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">issue tracker of OpenKeychain</a>.</p>
<h2>Contribute</h2>
<p>If you want to help us developing OpenKeychain by contributing code <a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">follow our small guide on Github</a>.</p>
<h2>Translations</h2>
<p>Help translating OpenKeychain! Everybody can participate at <a href="https://www.transifex.com/projects/p/openpgp-keychain/">OpenKeychain on Transifex</a>.</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## How do I activate OpenKeychain in K-9 Mail?
To use OpenKeychain with K-9 Mail, you want to follow these steps:
1. Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.
2. Select "Account settings" and scroll to the very bottom and click "Cryptography".
3. Click on "OpenPGP Provider" and select OpenKeychain from the list.
## I found a bug in OpenKeychain!
Please report the bug using the [issue tracker of OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribute
If you want to help us developing OpenKeychain by contributing code [follow our small guide on Github](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Translations
Help translating OpenKeychain! Everybody can participate at [OpenKeychain on Transifex](https://www.transifex.com/projects/p/openpgp-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> est une implémentation d'OpenPGP pour Android.</p>
<p>Licence : GPLv3+</p>
<h2>Développeurs</h2>
<ul>
<li>Dominik Schürmann (mainteneur)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar « kalkin » Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>« mar-v-in »</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>« 'Senecaso »</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Bibliothèques</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (Licence MIT X11)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">Bibliothèque d'échange SafeSlinger</a> (Licence MIT)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Bibliothèques de soutien Android</a> (Licence Apache v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Licence Apache v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (License Apache v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (License Apache v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Licence Apache v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Licence Apache v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Licence Apache v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (conception matérielle )</a> (Licence Apache v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Licence Apache v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (Licence MIT)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Licence Apache v2)</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) est une mise en œuvre d'OpenPGP pour Android.
Licence : GPLv3+
## Développeurs
* Dominik Schürmann (mainteneur)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar « kalkin » Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* « mar-v-in »
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* « Senecaso »
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Bibliothèques
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (Licence MIT X11)
* [Bibliothèque d'échange SafeSlinger](https://github.com/SafeSlingerProject/exchange-android) (Licence MIT)
* [Bibliothèques de soutien Android](http://developer.android.com/tools/support-library/index.html) (Licence Apache v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Licence Apache v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Licence Apache v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Licence Apache v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Licence Apache v2)
* [ZXing](https://github.com/zxing/zxing) (Licence Apache v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Licence Apache v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Conception matérielle)</a> (Licence Apache v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Licence Apache v2)
* [Snackbar](https://github.com/nispok/snackbar) (Licence MIT)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Licence Apache v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Licence Apache v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Licence Apache v2)

View File

@@ -0,0 +1,27 @@
## Confirmation de clef
Sans confirmation, vous ne pouvez pas être certain que la clef appartient à une personne déterminée.
La façon la plus simple de confirmer une clef est en balayant le code QR ou en l'échangeant par NFC.
Pour confirmer des clefs entre plus de deux personnes, nous suggérons d'utiliser la méthode d'échange de clef proposée pour vos clefs.
## État de la clef
<img src="status_signature_verified_cutout_24dp"/>
Confirmée : vous avez déjà confirmé cette clef, p. ex. en balayant le code QR.
<img src="status_signature_unverified_cutout_24dp"/>
Non confirmée : cette clef n'a pas encore été confirmée. Vous ne pouvez pas être certain que la clef appartient à une personne déterminée.
<img src="status_signature_expired_cutout_24dp"/>
Expirée : cette clef n'est plus valide. Seul le propriétaire peut prolonger sa validité.
<img src="status_signature_revoked_cutout_24dp"/>
Révoquée : cette n'est plus valide. Elle a été révoquée par son propriétaire.
## Informations avancées
Avec OpenKeychain une « confirmation de clef » est effectuée en créant une certification d'après la norme OpenPGP.
Cette certification est une [« certification générique » (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) décrite ainsi dans la norme :
« L'émetteur de cette certification n'affirme aucunement que le certificateur a bien vérifié que le propriétaire de la clef est bel et bien la personne décrite par l'ID utilisateur »
Habituellement, les certifications (il en est de même avec les niveaux supérieurs de certification, tels que le « certifications positives » (0x13)) sont organisées dans la toile de confiance d'OpenPGP.
Notre modèle de confirmation de clef est un concept bien plus simple pour éviter les problèmes habituels de convivialité associés à cette toile de confiance.
Nous assumons que les clefs sont vérifiées seulement jusqu'à un certain degré qui est quand même assez utilisable pour être exécuté « à la volée ».
Nous ne mettons pas non plus en place des signatures de confiance (potentiellement transitives) ou une base de données « ownertrust » comme dans GnuPG.
De plus, les clefs contenant au moins un ID utilisateur certifié par une clef de confiance seront marquées « confirmée » dans les listages de clefs.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>Correctif - Exportation des clefs vers des fichiers (vraiment, maintenant)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>Correctif - Exportation des clefs vers des fichiers (elles n'étaient écrites que partiellement)</li>
<li>Correctif - Plantage sur Android 2.3</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Plantage corrigé sur Android 5</li>
<li>Nouvel écran de certification</li>
<li>Échange sécurisé directement depuis la liste des clefs (bibliothèque SafeSlinger)</li>
<li>Nouveau flux de programme pour les codes QR</li>
<li>Écran de déchiffrement redessiné</li>
<li>Nouveaux agencement et couleurs d'icônes</li>
<li>Importation des clefs secrètes corrigée depuis le bureau de chiffrement Symantec</li>
<li>Les ID de sous-clefs des Yubikeys sont maintenant vérifiés correctement</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>Meilleure gestion de l'importation de nombreuses clefs</li>
<li>Sélection des sous-clefs améliorée</li>
</ul>
<h2>3.0</h2>
<ul>
<li>Prise en charge complète de la génération de signature par Yubikey et de leur déchiffrement !</li>
<li>Des applis compatibles installables sont proposées dans la liste des applis</li>
<li>Nouvelle conception pour les écrans de déchiffrement</li>
<li>Nombreux correctifs d'importation des clefs, corrigent aussi les clefs dépouillées</li>
<li>Accepter et afficher les drapeaux d'authentification des clefs</li>
<li>Interface utilisateur pour générer des clefs personnalisées</li>
<li>Corrigé - certificats de révocation des ID utilisateurs</li>
<li>Nouvelle recherche nuagique (dans les serveurs traditionnels et dans keybase.io)</li>
<li>Prise en charge du dépouillement des clefs dans OpenKeychain</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>Correctif - Clefs brisées dans 2.9.1</li>
<li>Le déchiffrement des Yukukeys par l'API fonctionne maintenant</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>Partage de l'écran de chiffrement en deux</li>
<li>Correctif - Gestion des drapeaux de clefs (prend maintenant en charge les clefs Mailvelope 0.7)</li>
<li>Gestion des phrases de passe améliorée</li>
<li>Partage de clefs par SafeSlinger</li>
<li>Yubikey : préférence pour permette d'autre NIP, seule la signature par l'API OpenPGP fonctionne présentement, mais pas à l'intérieur d'OpenKeychain</li>
<li>Correctif - Utilisation de clefs dépouillées</li>
<li>SHA256 par défaut pour la compatibilité</li>
<li>L'API des intentions a changé, voir https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>L'API d'OpenPGP gère maintenant les clefs révoquées/expirées et retourne tous les ID utilisateurs</li>
</ul>
<h2>2.9</h2>
<ul>
<li>Correction des plantages présents dans v2.8</li>
<li>Prise en charge expérimentale CCE</li>
<li>Prise en charge expérimentale de Yubikey (signature seulement avec les clefs importées)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>Tellement de bogues ont été réglés dans cette version que nous nous concentrons sur les nouvelles caractéristiques principales.</li>
<li>Modification des clefs : nouvelle et superbe conception, révocations des clefs</li>
<li>Importation des clefs : nouvelle et superbe conception, connexion sécurisé aux serveurs de clefs par hkps, résolution des serveurs de clefs par transactions DNS SRV</li>
<li>Nouvel écran de premier lancement</li>
<li>Nouvel écran de création de clef : auto-remplissage du nom et du courriel d'après vos coordonnées Android</li>
<li>Chiffrement des fichiers : nouvelle et superbe conception, prise en charge du chiffrement de fichiers multiples</li>
<li>Nouvelles icônes d'état des clefs (par Brennan Novak)</li>
<li>Correctif important de bogue : l'importation de grandes collections de clefs à partir d'un fichier est maintenant possible</li>
<li>Notification montrant les phrases de passe en cache</li>
<li>Les clefs sont connectées aux contacts d'Android</li>
</ul>
<p>Cette version ne serait pas possible sans le travail de Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
<h2>2.7</h2>
<ul>
<li>Violet ! (Dominik, Vincent)</li>
<li>Nouvelle présentation de la visualisation des clefs (Dominik, Vincent)</li>
<li>Nouveaux boutons Android plats (Dominik, Vincent)</li>
<li>Correctifs de l'API (Dominik)</li>
<li>Importation de Keybase.io (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>Quelques correctifs de bogues de régression</li>
</ul>
<h2>2.6</h2>
<ul>
<li>Certifications des clefs (merci à Vincent Breitmoser)</li>
<li>Prise en charge clefs secrètes partielles de GnuPG (merci à Vincent Breitmoser)</li>
<li>Nouvelle conception de la vérification de signatures</li>
<li>Longueur de clef personnalisée (merci à Greg Witczak)</li>
<li>Correctif - Fonctionnalités partagées d'autres applis</li>
</ul>
<h2>2.5</h2>
<ul>
<li>Correctif - Déchiffrement des messages/fichiers symétriques OpenPGP</li>
<li>Écran de modification des clefs remanié (merci à Ash Hughes)</li>
<li>Nouvelle conception moderne pour les écrans de chiffrement/déchiffrement</li>
<li>API OpenPGP version 3 (comptes multiples d'api, correctifs internes, recherche de clefs)</li>
</ul>
<h2>2.4</h2>
<p>Merci à tous les participants de « Google Summer of Code 2014 » qui ont rendu cette version riche en fonctions et sans bogue !
À part plusieurs petits correctifs, un nombre notable de correctifs ont été apportés par les personnes suivantes (par ordre alphabétique) :
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>Nouvelle liste de clefs unifiée</li>
<li>Empreintes de clefs colorées</li>
<li>Prise en charge des ports des serveurs de clefs</li>
<li>Désactiver la possibilité de générer des clefs faibles</li>
<li>Encore plus de travail interne dans l'API</li>
<li>Certifier les ID utilisateurs</li>
<li>Requêtes des serveurs de clefs basées sur des sorties assimilables par la machine</li>
<li>Verrouiller les tiroirs de navigation sur les tablettes</li>
<li>Suggestion de courriels à la création de clefs</li>
<li>Rechercher dans les listes de clefs publiques</li>
<li>Et bien plus d'améliorations et de correctifs</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>Correctif d'urgence pour le plantage lors de la mise à niveau à partir d'anciennes versions</li>
</ul>
<h2>2.3</h2>
<ul>
<li>Suppressions de l'exportation non nécessaire des clefs publiques lors de l'exportation de clefs secrètes (merci à Ash Hughes)</li>
<li>Correctif - Définition de la date de péremption des clefs (merci à Ash Hughes)</li>
<li>Plus de correctifs internes affectant la modifications des clefs (merci à Ash hughes)</li>
<li>Interrogation des serveurs de clefs directement depuis l'écran d'importation</li>
<li>Correctif - Mise en page et du style des fenêtres de dialogue sur Android 2.2-3.0</li>
<li>Correctif - Plantage pour les clefs avec des ID utilisateur vides</li>
<li>Correctif - Plantage et listes vides en revenant de l'écran de signature</li>
<li>Bouncy Castle (bibliothèque cryptographique) mise à jour de 1.47 à 1.50 et compilée depuis la source</li>
<li>Correctif - Téléversement d'une clef depuis l'écran de signature</li>
</ul>
<h2>2.2</h2>
<ul>
<li>Nouvelle conception avec tiroir de navigation</li>
<li>Nouvelle conception de la liste des clefs publics</li>
<li>Nouvelle vue des clefs publics</li>
<li>Correctif de bogues d'importation de clefs</li>
<li>Certification croisée des clefs (merci à Ash Hughes)</li>
<li>Bonne gestion des mots de passe UTF-8 (merci à Ash Hughes)</li>
<li>Première version avec de nouvelles langues (merci aux contributeurs sur Transifex)</li>
<li>Correctif et amélioration du partage de clefs par codes QR</li>
<li>Vérification de la signature des paquets pour l'API</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>mise à jour de l'API, préparation à l'intégration à K-9 Mail</li>
</ul>
<h2>2.1</h2>
<ul>
<li>Beaucoup de bogues corrigés</li>
<li>Nouvelle API pour les développeurs</li>
<li>Correctif du blogue PRNG par Google</li>
</ul>
<h2>2.0</h2>
<ul>
<li>Conception complètement repensée</li>
<li>Partage de clefs publiques par codes QR, faisceau NFC</li>
<li>Signer les clefs</li>
<li>Téléverser les clefs vers le serveur</li>
<li>Corrige des problèmes d'importation</li>
<li>Nouvelle API AIDL</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>Prise en charge de base du serveur de clefs</li>
<li>App2sd</li>
<li>Plus de choix pour le cache de la phrase de passe : 1, 2, 4, 8 heures</li>
<li>Traductions : norvégien (merci Sander Danielsen), chinois (merci Zhang Fredrick)</li>
<li>Correctifs de bogues</li>
<li>Optimisations</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>Problème corrigé avec la vérification de la signature des textes se terminant par un retour à la ligne</li>
<li>Plus de choix pour la durée de vie de la phrase de passe (20, 40, 60 min)</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Correctif - Plantage lors de l'ajout de compte sur Froyo</li>
<li>Suppression sécurisée de fichiers</li>
<li>Option de suppression du fichier de clef après l'importation</li>
<li>Chiffrement/déchiffrement de flux (galerie, etc.)</li>
<li>Nouvelles options (langue, forcer les signatures v3)</li>
<li>Changements dans l'interface</li>
<li>Correctifs de bogues</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>Traduction allemande et italienne</li>
<li>Paquet beaucoup plus petit grâce à des sources BC réduites</li>
<li>Nouvelle IUG pour les préférences</li>
<li>Ajustement de la mise en page pour les localisations</li>
<li>Correctif de bogue de signature</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>Correction d'un autre plantage causé par quelque bogue SDK avec le constructeur de requêtes</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>Corrections de plantages durant le chiffrement/la signature et possiblement l'exportation de clefs</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>Listes de clefs filtrables</li>
<li>Présélection plus intelligente des clefs de chiffrement</li>
<li>Nouvelle gestion des intentions pour VIEW et SEND, permet le chiffrement/déchiffrement des fichiers depuis les gestionnaires de fichiers</li>
<li>Correctifs et fonctions additionnelles (présélection des clefs) pour K-9-Mail, nouvelle version bêta proposée</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>Le listage des comptes Gmail ne fonctionnait pas dans 1.0.0, corrigé de nouveau</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>Intégration à K-9 Mail, APG prenant en charge la version bêta de K-9 Mail</li>
<li>Prise en charge de plus de gestionnaires de fichiers (incluant ASTRO)</li>
<li>Traduction slovène</li>
<li>Nouvelle base de données, bien plus rapide, utilisation de la mémoire moindre</li>
<li>Intentions définies et fournisseur de contenu pour d'autres applis</li>
<li>Correctifs de bogues</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integration of QR Scanner (New permissions required)
* Improved key creation wizard
* Fix missing contacts after sync
* Requires Android 4
* Redesigned key screen
* Simplify crypto preferences, better selection of secure ciphers
* API: Detached signatures, free selection of signing key,...
* Fix: Some valid keys were shown revoked or expired
* Don't accept signatures by expired or revoked subkeys
* Keybase.io support in advanced view
## 3.1.2
* Fix key export to files (now for real)
## 3.1.1
* Fix key export to files (they were written partially)
* Fix crash on Android 2.3
## 3.1
* Fix crash on Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Better handling of large key imports
* Improved subkey selection
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>Comment puis-je activer OpenKeychain dans K-9 Mail ?</h2>
<p>Pour utiliser OpenKeychain avec K-9 Mail, vous devez suivre ces étapes :</p>
<ol>
<li>Ouvrez K-9 Mail et toquez longuement sur le compte avec lequel vous voulez utiliser OpenKeychain. </li>
<li>Sélectionnez « Paramètres du compte », faite défiler vers le bas et cliquez sur « Cryptographie».</li>
<li>Cliquez sur « Fournisseur OpenPGP » et sélectionnez OpenKeychain dans la liste.</li>
</ol>
<h2>J'ai trouvé un bogue dans OpenKeychain !</h2>
<p>Veuillez rapporter le bogue en utilisant le <a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">gestionnaire de bogue d'OpenKeychain</a>.</p>
<h2>Contribuer</h2>
<p>Si vous voulez nous aider à développer OpenKeychain en y contribuant par du code <a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">veuillez suivre notre petit guide sur Github</a>.</p>
<h2>Traductions</h2>
<p>Aidez-nous à traduire le OpenKeychain ! Tout le monde peut y participer sur la <a href="https://www.transifex.com/projects/p/openpgp-keychain/">page d'OpenKeychain sur Transifex</a>.</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## Comment puis-je activer OpenKeychain dans K-9 Mail ?
Pour utiliser OpenKeychain avec K-9 Mail, vous devez suivre ces étapes :
1. Ouvrez K-9 Mail et appuyez longuement sur le compte avec lequel vous voulez utiliser OpenKeychain.
2. Sélectionnez « Paramètres du compte », faite défiler vers le bas et cliquez sur « Cryptographie ».
3. Cliquez sur « Fournisseur OpenPGP » et sélectionnez OpenKeychain dans la liste.
## J'ai trouvé un bogue dans OpenKeychain !
Veuillez signaler le bogue en utilisant le [gestionnaire de bogue d'OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribuer
Si vous voulez nous aider à développer OpenKeychain en y contribuant par du code [veuillez suivre notre petit guide sur Github](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Traductions
Aidez à traduire OpenKeychain ! Tout le monde peut y participer sur la [page d'OpenKeychain sur Transifex](https://www.transifex.com/projects/p/open-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> is an OpenPGP implementation for Android.</p>
<p>License: GPLv3+</p>
<h2>Developers</h2>
<ul>
<li>Dominik Schürmann (Maintainer)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Libraries</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (MIT X11 License)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">SafeSlinger Exchange library</a> (MIT License)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Support Libraries</a> (Apache License v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Apache License v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Apache License v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Apache License v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Apache License v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Apache License v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Apache License v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (Material Design)</a> (Apache License v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Apache License v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (MIT License)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Apache License v2)</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) is an OpenPGP implementation for Android.
License: GPLv3+
## Developers
* Dominik Schürmann (Maintainer)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Libraries
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (MIT X11 License)
* [SafeSlinger Exchange library](https://github.com/SafeSlingerProject/exchange-android) (MIT License)
* [Android Support Libraries](http://developer.android.com/tools/support-library/index.html) (Apache License v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Apache License v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Apache License v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Apache License v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Apache License v2)
* [ZXing](https://github.com/zxing/zxing) (Apache License v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Apache License v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Material Design)</a> (Apache License v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Apache License v2)
* [Snackbar](https://github.com/nispok/snackbar) (MIT License)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Apache License v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Apache License v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Apache License v2)

View File

@@ -0,0 +1,27 @@
## Key Confirmation
Without confirmation, you cannot be sure if a key really corresponds to a specific person.
The most simplest way to confirm a key is by scanning the QR Code or exchanging it via NFC.
To confirm keys between more than two persons, we suggest to use the key exchange method available for your keys.
## Key Status
<img src="status_signature_verified_cutout_24dp"/>
Confirmed: You have already confirmed this key, e.g., by scanning the QR Code.
<img src="status_signature_unverified_cutout_24dp"/>
Unconfirmed: This key has not been confirmed yet. You cannot be sure if the key really corresponds to a specific person.
<img src="status_signature_expired_cutout_24dp"/>
Expired: This key is no longer valid. Only the owner can extend its validity.
<img src="status_signature_revoked_cutout_24dp"/>
Revoked: This key is no longer valid. It has been revoked by its owner.
## Advanced Information
A "key confirmation" in OpenKeychain is implemented by creating a certification according to the OpenPGP standard.
This certification is a ["generic certification (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) described in the standard by:
"The issuer of this certification does not make any particular assertion as to how well the certifier has checked that the owner of the key is in fact the person described by the User ID."
Traditionally, certifications (also with higher certification levels, such as "positive certifications" (0x13)) are organized in OpenPGP's Web of Trust.
Our model of key confirmation is a much simpler concept to avoid common usability problems related to this Web of Trust.
We assume that keys are verified only to a certain degree that is still usable enough to be executed "on the go".
We also do not implement (potentially transitive) trust signatures or an ownertrust database like in GnuPG.
Furthermore, keys which contain at least one user ID certified by a trusted key will be marked as "confirmed" in the key listings.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>Fix key export to files (now for real)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>Fix key export to files (they were written partially)</li>
<li>Fix crash on Android 2.3</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Fix crash on Android 5</li>
<li>New certify screen</li>
<li>Secure Exchange directly from key list (SafeSlinger library)</li>
<li>New QR Code program flow</li>
<li>Redesigned decrypt screen</li>
<li>New icon usage and colors</li>
<li>Fix import of secret keys from Symantec Encryption Desktop</li>
<li>Subkey IDs on Yubikeys are now checked correctly</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>Better handling of large key imports</li>
<li>Improved subkey selection</li>
</ul>
<h2>3.0</h2>
<ul>
<li>Full support for Yubikey signature generation and decryption!</li>
<li>Propose installable compatible apps in apps list</li>
<li>New design for decryption screens</li>
<li>Many fixes for key import, also fixes stripped keys</li>
<li>Honor and display key authenticate flags</li>
<li>User interface to generate custom keys</li>
<li>Fixing user id revocation certificates</li>
<li>New cloud search (searches over traditional keyservers and keybase.io)</li>
<li>Support for stripping keys inside OpenKeychain</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>Fix keys broken in 2.9.1</li>
<li>Yubikey decryption now working via API</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>Split encrypt screen into two</li>
<li>Fix key flags handling (now supporting Mailvelope 0.7 keys)</li>
<li>Improved passphrase handling</li>
<li>Key sharing via SafeSlinger</li>
<li>Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain</li>
<li>Fix usage of stripped keys</li>
<li>SHA256 as default for compatibility</li>
<li>Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>OpenPGP API now handles revoked/expired keys and returns all user ids</li>
</ul>
<h2>2.9</h2>
<ul>
<li>Fixing crashes introduced in v2.8</li>
<li>Experimental ECC support</li>
<li>Experimental Yubikey support (signing-only with imported keys)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>So many bugs have been fixed in this release that we focus on the main new features</li>
<li>Key edit: awesome new design, key revocation</li>
<li>Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records</li>
<li>New first time screen</li>
<li>New key creation screen: autocompletion of name and email based on your personal Android accounts</li>
<li>File encryption: awesome new design, support for encrypting multiple files</li>
<li>New icons to show status of key (by Brennan Novak)</li>
<li>Important bug fix: Importing of large key collections from a file is now possible</li>
<li>Notification showing cached passphrases</li>
<li>Keys are connected to Android's contacts</li>
</ul>
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
<h2>2.7</h2>
<ul>
<li>Purple! (Dominik, Vincent)</li>
<li>New key view design (Dominik, Vincent)</li>
<li>New flat Android buttons (Dominik, Vincent)</li>
<li>API fixes (Dominik)</li>
<li>Keybase.io import (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>Some fixes for regression bugs</li>
</ul>
<h2>2.6</h2>
<ul>
<li>Key certifications (thanks to Vincent Breitmoser)</li>
<li>Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)</li>
<li>New design for signature verification</li>
<li>Custom key length (thanks to Greg Witczak)</li>
<li>Fix share-functionality from other apps</li>
</ul>
<h2>2.5</h2>
<ul>
<li>Fix decryption of symmetric OpenPGP messages/files</li>
<li>Refactored key edit screen (thanks to Ash Hughes)</li>
<li>New modern design for encrypt/decrypt screens</li>
<li>OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)</li>
</ul>
<h2>2.4</h2>
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>New unified key list</li>
<li>Colorized key fingerprint</li>
<li>Support for keyserver ports</li>
<li>Deactivate possibility to generate weak keys</li>
<li>Much more internal work on the API</li>
<li>Certify user ids</li>
<li>Keyserver query based on machine-readable output</li>
<li>Lock navigation drawer on tablets</li>
<li>Suggestions for emails on creation of keys</li>
<li>Search in public key lists</li>
<li>And much more improvements and fixes…</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>Hotfix for crash when upgrading from old versions</li>
</ul>
<h2>2.3</h2>
<ul>
<li>Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)</li>
<li>Fix setting expiry dates on keys (thanks to Ash Hughes)</li>
<li>More internal fixes when editing keys (thanks to Ash Hughes)</li>
<li>Querying keyservers directly from the import screen</li>
<li>Fix layout and dialog style on Android 2.2-3.0</li>
<li>Fix crash on keys with empty user ids</li>
<li>Fix crash and empty lists when coming back from signing screen</li>
<li>Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source</li>
<li>Fix upload of key from signing screen</li>
</ul>
<h2>2.2</h2>
<ul>
<li>New design with navigation drawer</li>
<li>New public key list design</li>
<li>New public key view</li>
<li>Bug fixes for importing of keys</li>
<li>Key cross-certification (thanks to Ash Hughes)</li>
<li>Handle UTF-8 passwords properly (thanks to Ash Hughes)</li>
<li>First version with new languages (thanks to the contributors on Transifex)</li>
<li>Sharing of keys via QR Codes fixed and improved</li>
<li>Package signature verification for API</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>API Updates, preparation for K-9 Mail integration</li>
</ul>
<h2>2.1</h2>
<ul>
<li>Lots of bug fixes</li>
<li>New API for developers</li>
<li>PRNG bug fix by Google</li>
</ul>
<h2>2.0</h2>
<ul>
<li>Complete redesign</li>
<li>Share public keys via QR codes, NFC beam</li>
<li>Sign keys</li>
<li>Upload keys to server</li>
<li>Fixes import issues</li>
<li>New AIDL API</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>Basic keyserver support</li>
<li>App2sd</li>
<li>More choices for passphrase cache: 1, 2, 4, 8, hours</li>
<li>Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)</li>
<li>Bugfixes</li>
<li>Optimizations</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>Fixed problem with signature verification of texts with trailing newline</li>
<li>More options for passphrase cache time to live (20, 40, 60 mins)</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Account adding crash on Froyo fixed</li>
<li>Secure file deletion</li>
<li>Option to delete key file after import</li>
<li>Stream encryption/decryption (gallery, etc.)</li>
<li>New options (language, force v3 signatures)</li>
<li>Interface changes</li>
<li>Bugfixes</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>German and Italian translation</li>
<li>Much smaller package, due to reduced BC sources</li>
<li>New preferences GUI</li>
<li>Layout adjustment for localization</li>
<li>Signature bugfix</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>Fixed another crash caused by some SDK bug with query builder</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>Fixed crashes during encryption/signing and possibly key export</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>Filterable key lists</li>
<li>Smarter pre-selection of encryption keys</li>
<li>New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers</li>
<li>Fixes and additional features (key preselection) for K-9 Mail, new beta build available</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>GMail account listing was broken in 1.0.0, fixed again</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>K-9 Mail integration, APG supporting beta build of K-9 Mail</li>
<li>Support of more file managers (including ASTRO)</li>
<li>Slovenian translation</li>
<li>New database, much faster, less memory usage</li>
<li>Defined Intents and content provider for other apps</li>
<li>Bugfixes</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integration of QR Scanner (New permissions required)
* Improved key creation wizard
* Fix missing contacts after sync
* Requires Android 4
* Redesigned key screen
* Simplify crypto preferences, better selection of secure ciphers
* API: Detached signatures, free selection of signing key,...
* Fix: Some valid keys were shown revoked or expired
* Don't accept signatures by expired or revoked subkeys
* Keybase.io support in advanced view
## 3.1.2
* Fix key export to files (now for real)
## 3.1.1
* Fix key export to files (they were written partially)
* Fix crash on Android 2.3
## 3.1
* Fix crash on Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Better handling of large key imports
* Improved subkey selection
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>How do I activate OpenKeychain in K-9 Mail?</h2>
<p>To use OpenKeychain with K-9 Mail, you want to follow these steps:</p>
<ol>
<li>Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.</li>
<li>Select "Account settings" and scroll to the very bottom and click "Cryptography".</li>
<li>Click on "OpenPGP Provider" and select OpenKeychain from the list.</li>
</ol>
<h2>I found a bug in OpenKeychain!</h2>
<p>Please report the bug using the <a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">issue tracker of OpenKeychain</a>.</p>
<h2>Contribute</h2>
<p>If you want to help us developing OpenKeychain by contributing code <a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">follow our small guide on Github</a>.</p>
<h2>Translations</h2>
<p>Help translating OpenKeychain! Everybody can participate at <a href="https://www.transifex.com/projects/p/openpgp-keychain/">OpenKeychain on Transifex</a>.</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## How do I activate OpenKeychain in K-9 Mail?
To use OpenKeychain with K-9 Mail, you want to follow these steps:
1. Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.
2. Select "Account settings" and scroll to the very bottom and click "Cryptography".
3. Click on "OpenPGP Provider" and select OpenKeychain from the list.
## I found a bug in OpenKeychain!
Please report the bug using the [issue tracker of OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribute
If you want to help us developing OpenKeychain by contributing code [follow our small guide on Github](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Translations
Help translating OpenKeychain! Everybody can participate at [OpenKeychain on Transifex](https://www.transifex.com/projects/p/openpgp-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> un implementazione OpenPGP per Android.</p>
<p>Licenza: GPLv3+</p>
<h2>Sviluppatori</h2>
<ul>
<li>Dominik Schürmann (Manutentore)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Librerie</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (Licenza MIT X11)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">Libreria SafeSlinger Exchange</a> (Licenza MIT)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Support Libraries</a> (Apache License v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Licenza Apache v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Licenza Apache v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Licenza Apache v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Licenza Apache v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Apache License v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Apache License v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (Material Design)</a> (Apache License v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Apache License v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (MIT License)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Apache License v2)</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) is an OpenPGP implementation for Android.
License: GPLv3+
## Developers
* Dominik Schürmann (Maintainer)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Libraries
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (MIT X11 License)
* [SafeSlinger Exchange library](https://github.com/SafeSlingerProject/exchange-android) (MIT License)
* [Android Support Libraries](http://developer.android.com/tools/support-library/index.html) (Apache License v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Apache License v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Apache License v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Apache License v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Apache License v2)
* [ZXing](https://github.com/zxing/zxing) (Apache License v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Apache License v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Material Design)</a> (Apache License v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Apache License v2)
* [Snackbar](https://github.com/nispok/snackbar) (MIT License)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Apache License v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Apache License v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Apache License v2)

View File

@@ -0,0 +1,27 @@
## Key Confirmation
Without confirmation, you cannot be sure if a key really corresponds to a specific person.
The most simplest way to confirm a key is by scanning the QR Code or exchanging it via NFC.
To confirm keys between more than two persons, we suggest to use the key exchange method available for your keys.
## Key Status
<img src="status_signature_verified_cutout_24dp"/>
Confirmed: You have already confirmed this key, e.g., by scanning the QR Code.
<img src="status_signature_unverified_cutout_24dp"/>
Unconfirmed: This key has not been confirmed yet. You cannot be sure if the key really corresponds to a specific person.
<img src="status_signature_expired_cutout_24dp"/>
Expired: This key is no longer valid. Only the owner can extend its validity.
<img src="status_signature_revoked_cutout_24dp"/>
Revoked: This key is no longer valid. It has been revoked by its owner.
## Advanced Information
A "key confirmation" in OpenKeychain is implemented by creating a certification according to the OpenPGP standard.
This certification is a ["generic certification (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) described in the standard by:
"The issuer of this certification does not make any particular assertion as to how well the certifier has checked that the owner of the key is in fact the person described by the User ID."
Traditionally, certifications (also with higher certification levels, such as "positive certifications" (0x13)) are organized in OpenPGP's Web of Trust.
Our model of key confirmation is a much simpler concept to avoid common usability problems related to this Web of Trust.
We assume that keys are verified only to a certain degree that is still usable enough to be executed "on the go".
We also do not implement (potentially transitive) trust signatures or an ownertrust database like in GnuPG.
Furthermore, keys which contain at least one user ID certified by a trusted key will be marked as "confirmed" in the key listings.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>Corretta esportazione chiavi su file (ora per davvero)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>Corretta esportazione chiavi su file (la scrittura era parziale)</li>
<li>Corretto crash su Android 2.3</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Corretto crash su Android 5</li>
<li>Nuova schermata di certificazione</li>
<li>Scambio sicuro direttamente dalla lista delle chiavi (libreria SafeSlinger)</li>
<li>Nuovo programma di flusso QR Code</li>
<li>Schermata di decodifica ridisegnata</li>
<li>Nuove icone e colori</li>
<li>Corretta importazione di chiavi segrete da Symantec Encryption Desktop</li>
<li>ID delle sottochiavi Yubikey sono controllati correttamente</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>Migliorata la gestione delle importazioni di grosse chiavi</li>
<li>Migliorata la selezione delle sottochiavi</li>
</ul>
<h2>3.0</h2>
<ul>
<li>Supporto completo per la generazione della firma e la decifratura Yubikey!</li>
<li>Proposte di apps compatibili installabili nella lista apps</li>
<li>Nuova grafica per le scermate di decifratura</li>
<li>Molte correzioni per l'importazione delle chiavi, corrette anche le chiavi ripulite</li>
<li>Caratteristiche di Stima e visualizzazione chiavi di autenticazione</li>
<li>Interfaccia utente per la generazione di chiavi personalizzate</li>
<li>Correzione certificati di revoca ID utente</li>
<li>Nuova ricerca su cloud (ricerche su server delle chiavi tradizionali e keybase.io)</li>
<li>Supporto di pulizia chiavi in OpenKeychain</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>Corretta chiave danneggiata in 2.9.1</li>
<li>Decodifica Yubikey ora funzionante via API</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>Divisa la schermata di codifica in due parti</li>
<li>Corretta la gestione delle caratteristiche delle chiavi (ora supporta le chiavi Mailvelope 0.7)</li>
<li>Migliorata la gestione delle frasi di accesso</li>
<li>Condivisione chiavi via SafeSlinger</li>
<li>Yubikey: preferenza per ammettere altri PIN, attualmente solo la firma via OpenPGP API funziona, non all'interno di OpenKeychain</li>
<li>Corretto l'utilizzo delle chiavi ripulite</li>
<li>SHA256 come predefinito per compatibilità</li>
<li>Intent API cambiato, vedete https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>Le OpenPGP API ora gestiscono le chiavi revocate/scadute e restituiscono tutti gli ID utente</li>
</ul>
<h2>2.9</h2>
<ul>
<li> Correzione crash introdotti nella versione 2.8</li>
<li>Supporto Sperimentale per ECC</li>
<li>Supporto sperimentale Yubikey (solo firma con chiavi importate)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>Così tanti bug sono stati corretti in questa versione che ci concentriamo sulle principali novità</li>
<li>Modifica chiave: nuovo eccezionale design, revoca chiave</li>
<li>Importa chiave: nuovo eccezionale design, connessioni sicure via keyserver HKPS, risoluzione keyserver tramite record SRV DNS</li>
<li>Nuova schermata di introduzione</li>
<li>Nuova schermata di creazione chiave: autocompletamento di nomi e email basato sui tuoi account personali di Android</li>
<li>Codifica File: nuovo eccezionale design, supporto per codifica di più documenti</li>
<li>Nuove icone per mostrare lo stato delle chiavi (di Brennan Novak)</li>
<li>Correzione bug importante: Importazione di grandi collezioni di chiavi da un file ora è possibile</li>
<li>Notifiche mostrando la frase di accesso nella cache</li>
<li>Le chiavi sono connesse ai contatti di Android</li>
</ul>
<p>Questo rilascio non sarebbe stato possibile senza il lavoro di Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
<h2>2.7</h2>
<ul>
<li>Porpora! (Dominik, Vincent)</li>
<li>Nuovo design della schermata chiavi (Dominik, Vincent)</li>
<li>Nuovi pulsanti piatti Android (Dominik, Vincent)</li>
<li>Correzioni API (Dominik)</li>
<li>Importazione Keybase.io (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>alcune correzioni per i bug di regressione</li>
</ul>
<h2>2.6</h2>
<ul>
<li>Certificazioni chiave (grazie a Vincent Breitmoser)</li>
<li>supporto per chiavi segrete parziali GnuPG (grazie a Vincent Breitmoser)</li>
<li>nuovo design per la verifica della firma</li>
<li>lunghezza chiave personalizzata (grazie a Greg Witczak)</li>
<li>fix funzionalità di condivisione da altre app</li>
</ul>
<h2>2.5</h2>
<ul>
<li>Fix decryption of symmetric OpenPGP messages/files</li>
<li>Refactoring della schermata di modifica chiave (grazie a Ash Hughes)</li>
<li>Nuovo design moderno per le schermate di codifica / decodifica</li>
<li>OpenPGP API versione 3 (api account multipli, correzioni interne, ricerca chiavi)</li>
</ul>
<h2>2.4</h2>
<p>Grazie a tutti i partecipanti di Google Summer of Code 2014 che hanno reso questo rilascio ricco di caratteristiche e privo di bug!
Oltre a numerose piccole correzioni, un notevole numero di patch sono state fatte dalle seguenti persone (in ordine alfabetico):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paolo Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>Nuova lista chiave unificata</li>
<li>Impronta chiave colorata</li>
<li>Supporto per le porte keyserver</li>
<li>disattivata la possibilità di generare chiavi deboli</li>
<li>Molto più lavoro interno sulle API</li>
<li>Certificazione ID utente</li>
<li>Interrogazione keyserver basate su output leggibile a livello macchina</li>
<li>Blocco del menu di navigazione sui tablet</li>
<li>Suggerimenti per e-mail sulla creazione di chiavi</li>
<li>Ricerca nelle liste di chiavi pubbliche</li>
<li>E molti altri miglioramenti e correzioni ...</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>Correzione del crash quando si aggiorna da versioni precedenti</li>
</ul>
<h2>2.3</h2>
<ul>
<li>Rimossa esportazione non necessaria delle chiavi pubbliche quando si esportano le chiavi private (grazie a Ash Hughes)</li>
<li>Corretto impostazione data di scadenza delle chiavi (grazie a Ash Hughes)</li>
<li>Molte altre correzioni interne quando si modificano le chiavi (grazie a Ash Hughes)</li>
<li>Interrogazione server delle chiavi direttamente dalla schermata di importazione</li>
<li>Corretta impaginazione e stile di dialogo su Android 2.2-3.0</li>
<li>Corretto crash su chiavi con id utente vuoto</li>
<li>Corretto crash e liste vuote quando si torna dalla schermata di firma</li>
<li>Bouncy Castle (libreria crittografica) aggiornata da 1.47 a 1.50 e compilata da sorgente</li>
<li>Corretto caricamento delle chiavi dalla schermata di firma</li>
</ul>
<h2>2.2</h2>
<ul>
<li>Nuovo design con barra di navigazione</li>
<li>Nuovo design per la lista chiavi pubbliche</li>
<li>Nuova visuale chiavi pubbliche</li>
<li>Correzione bug per importazione chiavi</li>
<li>Chiave certificazione incrociata (grazie a Ash Hughes)</li>
<li>Password UTF-8 gestite correttamente (grazie a Ash Hughes)</li>
<li>Prima versione con nuove lingue (grazie ai contributori su Transifex)</li>
<li>Condivisione di chiavi via Codici QR corretta e migliorata</li>
<li>Verifica firma pacchetto per API</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>Aggiornamenti API, preparazione per integrazione con K-9 Mail</li>
</ul>
<h2>2.1</h2>
<ul>
<li>Molte correzioni di bug</li>
<li>Nuove API per sviluppatori</li>
<li>PRNG bug fix by Google</li>
</ul>
<h2>2.0</h2>
<ul>
<li>Completo restyle</li>
<li>Condivisione chiavi pubbliche via codici qr, nfc beam</li>
<li>Firma chiavi</li>
<li>Caricamento chiavi sul server</li>
<li>Corrette caratteristiche di importazione</li>
<li>Nuova API AIDL</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>Supporto base per server delle chiavi</li>
<li>App2sd</li>
<li>Aggiunte opzioni per la cache della frase di accesso: 1, 2, 4, 8 ore</li>
<li>Traduzioni: Norvegese (grazie, Sander Danielsen), Cinese (grazie, Zhang Fredrick)</li>
<li>Correzione bug</li>
<li>Ottimizzazioni</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>Corretto problema con la verifica firma di testi con capo finale</li>
<li>Maggiori opzioni per il tempo di mantenimento della cache della frase di accesso (20, 40, 60 minuti)</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Crash della aggiunta degli account risolto su Froyo</li>
<li>Cancellazione sicura dei file</li>
<li>Opzione per cancellare file delle chiavi dopo l'importazione</li>
<li>Flusso codifica/decodifica (galleria, ecc.)</li>
<li>Nuove opzioni (lingua, forza firme v3)</li>
<li>Cambiamenti interfaccia</li>
<li>Correzione bug</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>Traduzione Italiana e Tedesca</li>
<li>Dimensioni pacchetto ridotte, a causa della riduzione dei sorgenti BC</li>
<li>Nuove preferenze GUI</li>
<li>Regolazione layout per la localizzazione</li>
<li>Correzione bug firma</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>Corretto altro crash causato da alcuni bug SDK con query builder</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>Corretto crash durante codifica/firma e possibilita' di esportare chiave</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>Liste chiavi filtrabili</li>
<li>Preselezione di chiavi di codifica intelligente</li>
<li>Nuovo gestore intent per VIEW e SEND, permette la codifica/decodifica file all'infuori di file manager</li>
<li>Caratteristiche corrette e aggiunte (preselezione chiavi) per K-9 Mail. nuova build beta disponibile</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>elencazione account GMail corrotta in 1.0.0, corretta nuovamente</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>integrazione K-9 Mail, APG supporto beta build di K-9 Mail</li>
<li>Supporto per altri file manager (incluso ASTRO)</li>
<li>traduzione Slovena</li>
<li>Nuovo database, piu' veloce, utilizzo memoria ridotto</li>
<li>Definiti Intent e ContentProvider per le altre app</li>
<li>Correzione bug</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integration of QR Scanner (New permissions required)
* Improved key creation wizard
* Fix missing contacts after sync
* Requires Android 4
* Redesigned key screen
* Simplify crypto preferences, better selection of secure ciphers
* API: Detached signatures, free selection of signing key,...
* Fix: Some valid keys were shown revoked or expired
* Don't accept signatures by expired or revoked subkeys
* Keybase.io support in advanced view
## 3.1.2
* Fix key export to files (now for real)
## 3.1.1
* Fix key export to files (they were written partially)
* Fix crash on Android 2.3
## 3.1
* Fix crash on Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Better handling of large key imports
* Improved subkey selection
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>How do I activate OpenKeychain in K-9 Mail?</h2>
<p>To use OpenKeychain with K-9 Mail, you want to follow these steps:</p>
<ol>
<li>Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.</li>
<li>Select "Account settings" and scroll to the very bottom and click "Cryptography".</li>
<li>Click on "OpenPGP Provider" and select OpenKeychain from the list.</li>
</ol>
<h2>Ho trovato un bug in OpenKeychain!</h2>
<p>Per favore riporta i bug usando il <a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">issue tracker di OpenKeychain</a>.</p>
<h2>Contribuire</h2>
<p>Se vuoi aiutarci nello sviluppo di OpenKeychain contribuendo al codice <a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">segui la nostra breve guida su Github</a>.</p>
<h2>Traduzioni</h2>
<p>Aiutaci a tradurre OpenKeychain! Tutti possono collaborare a <a href="https://www.transifex.com/projects/p/openpgp-keychain/">OpenKeychain su Transifex</a>.</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## How do I activate OpenKeychain in K-9 Mail?
To use OpenKeychain with K-9 Mail, you want to follow these steps:
1. Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.
2. Select "Account settings" and scroll to the very bottom and click "Cryptography".
3. Click on "OpenPGP Provider" and select OpenKeychain from the list.
## I found a bug in OpenKeychain!
Please report the bug using the [issue tracker of OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribute
If you want to help us developing OpenKeychain by contributing code [follow our small guide on Github](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Translations
Help translating OpenKeychain! Everybody can participate at [OpenKeychain on Transifex](https://www.transifex.com/projects/p/openpgp-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> は Android における OpenPGP 実装です。</p>
<p>ライセンス: GPLv3以降</p>
<h2>開発者</h2>
<ul>
<li>Dominik Schürmann (メンテナ)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>ライブラリ</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (MIT X11 License)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">SafeSlinger Exchange library</a> (MIT License)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Support Libraries</a> (Apache License v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Apache License v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Apache License v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Apache License v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Apache License v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Apache License v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Apache License v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (Material Design)</a> (Apache License v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Apache License v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (MIT License)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Apache License v2)</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) is an OpenPGP implementation for Android.
License: GPLv3+
## Developers
* Dominik Schürmann (Maintainer)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Libraries
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (MIT X11 License)
* [SafeSlinger Exchange library](https://github.com/SafeSlingerProject/exchange-android) (MIT License)
* [Android Support Libraries](http://developer.android.com/tools/support-library/index.html) (Apache License v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Apache License v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Apache License v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Apache License v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Apache License v2)
* [ZXing](https://github.com/zxing/zxing) (Apache License v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Apache License v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Material Design)</a> (Apache License v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Apache License v2)
* [Snackbar](https://github.com/nispok/snackbar) (MIT License)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Apache License v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Apache License v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Apache License v2)

View File

@@ -0,0 +1,27 @@
## Key Confirmation
Without confirmation, you cannot be sure if a key really corresponds to a specific person.
The most simplest way to confirm a key is by scanning the QR Code or exchanging it via NFC.
To confirm keys between more than two persons, we suggest to use the key exchange method available for your keys.
## Key Status
<img src="status_signature_verified_cutout_24dp"/>
Confirmed: You have already confirmed this key, e.g., by scanning the QR Code.
<img src="status_signature_unverified_cutout_24dp"/>
Unconfirmed: This key has not been confirmed yet. You cannot be sure if the key really corresponds to a specific person.
<img src="status_signature_expired_cutout_24dp"/>
Expired: This key is no longer valid. Only the owner can extend its validity.
<img src="status_signature_revoked_cutout_24dp"/>
Revoked: This key is no longer valid. It has been revoked by its owner.
## Advanced Information
A "key confirmation" in OpenKeychain is implemented by creating a certification according to the OpenPGP standard.
This certification is a ["generic certification (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) described in the standard by:
"The issuer of this certification does not make any particular assertion as to how well the certifier has checked that the owner of the key is in fact the person described by the User ID."
Traditionally, certifications (also with higher certification levels, such as "positive certifications" (0x13)) are organized in OpenPGP's Web of Trust.
Our model of key confirmation is a much simpler concept to avoid common usability problems related to this Web of Trust.
We assume that keys are verified only to a certain degree that is still usable enough to be executed "on the go".
We also do not implement (potentially transitive) trust signatures or an ownertrust database like in GnuPG.
Furthermore, keys which contain at least one user ID certified by a trusted key will be marked as "confirmed" in the key listings.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>鍵のファイルへのエクスポートの修正 (現実的になりました)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>鍵のファイルへのエクスポートの修正 (部分的に修正)</li>
<li>Android 2.3でのクラッシュ修正</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Android 5でのクラッシュ修正</li>
<li>新しい検証画面</li>
<li>セキュアな鍵リストの直接交換(SafeSlinger ライブラリ)</li>
<li>新しいQRコードのプログラムフロー</li>
<li>復号化画面の再デザイン</li>
<li>新しいアイコン利用とカラー</li>
<li>Symantec Encryption Desktopから秘密鍵をインポート時の問題修正</li>
<li>Yubikeyでの副鍵IDを正くチェックするようになりました</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>巨大な鍵のインポートのより良い取り扱い</li>
<li>副鍵選択の改善</li>
</ul>
<h2>3.0</h2>
<ul>
<li>Yubikeyでの署名生成と復号化のフルサポート</li>
<li>アプリリスト内の互換性のあるアプリをインストールが可能であると提案します</li>
<li>復号化画面を新しいデザインに</li>
<li>鍵のインポートで沢山の修正、また鍵のストリップでも修正</li>
<li>鍵の認証フラグの表示と設定</li>
<li>カスタムした鍵の生成のユーザーインタフェース</li>
<li>ユーザーID破棄証明の修正</li>
<li>新しいクラウド検索 (古典的な keyserverと keybase.io から検索します)</li>
<li>OpenKeychain内で鍵をストリップするのをサポートしました</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>2.9.1での鍵破壊問題修正</li>
<li>API経由でYubikeyの復号処理が動くようになった</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>暗号化スクリーンを2つに分割</li>
<li>鍵のフラグ管理を修正 (現在Mailvelope 0.7 鍵をサポート)</li>
<li>パスフレーズの取り回しを改善</li>
<li>SafeSlingerでの鍵の共有</li>
<li>Yubikey: 設定で他のPINを受け付け、現在OpenPGP API経由での署名しか動きません、OpenKeychainの内部ではないため</li>
<li>ストリップした鍵の利用法を修正</li>
<li>互換性のためデフォルトをSHA256に</li>
<li>インテント API を変更しました、以下参照 https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>OpenPGP API は現在破棄/期限切れの鍵を扱えるようになり、またすべてのユーザIDを返すようになりました</li>
</ul>
<h2>2.9</h2>
<ul>
<li>v2.8 から発生したクラッシュ問題をFix</li>
<li>実験的にECCをサポート</li>
<li>実験的にYubikeyをサポート(インポート済みの鍵での署名のみ)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>そして主要な新しい機能を主眼としたこのリリースでたくさんのバグが修正されました</li>
<li>鍵編集: 新しいすごいデザイン、鍵の破棄</li>
<li>鍵インポート: 新しいすごいデザイン、hkps経由での鍵サーバとの安全な接続、そしてDNS SRVレコードによる鍵サーバの解決</li>
<li>新しい初回表示</li>
<li>新しい鍵生成画面: Androidのあなたの個人アカウントをベースとした名前とメールの自動補完</li>
<li>ファイル暗号化: 新しいすごいデザイン、複数ファイルの暗号化をサポートする</li>
<li>鍵のステータス表示の新しいアイコン(Brennan Novak提供)</li>
<li>重要なバグ修正: 巨大な鍵コレクションをファイルからインポートするのが可能になりました</li>
<li>キャッシュしたパスフレーズの通知表示</li>
<li>鍵のアドレスをAndroidの連絡先と連携するようにした</li>
</ul>
<p> Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfiharの働きなくしてはこのリリースはありませんでした</p>
<h2>2.7</h2>
<ul>
<li>Purple! (Dominik, Vincent)</li>
<li>新しい鍵のビューのデザイン (Dominik, Vincent)</li>
<li>新しいフラットな Android ボタン (Dominik, Vincent)</li>
<li>API のフィックス (Dominik)</li>
<li>Keybase.io からのインポート (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>いくつかのリグレッションバグ修正</li>
</ul>
<h2>2.6</h2>
<ul>
<li>鍵証明 (ありがとうVincent Breitmoser)</li>
<li>GnuPGの部分秘密鍵のサポート (ありがとうVincent Breitmoser)</li>
<li>新しいデザインでの署名の検証</li>
<li>カスタムの鍵長 (ありがとうGreg Witczak)</li>
<li>他のアプリからの共有ファンクションの修正</li>
</ul>
<h2>2.5</h2>
<ul>
<li>対称暗号化PGPメッセージ/ファイルの復号化を修正</li>
<li>鍵編集画面のリファクタ (ありがとうAsh Hughes)</li>
<li>暗号化/復号化画面を新しいモダンなデザインに</li>
<li>OpenPGP API バージョン 3 (複数APIアカウント, 内部修正,鍵検索)</li>
</ul>
<h2>2.4</h2>
<p>このリリースにおいて適用したリッチでバグのない機能を作ってくれたGoogle Summer of Code 2014の参加者たちに感謝を!
また、以下の人達(アルファベット順)の作ってくれたいくつもの小さなパッチや相当数のパッチにも:
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>新しい統合キーリスト</li>
<li>鍵指紋のカラー化</li>
<li>鍵サーバのポート設定のサポート</li>
<li>弱い鍵の生成が可能だったのを無効化</li>
<li>さらなるAPIでの内部動作</li>
<li>ユーザーIDの証明</li>
<li>鍵サーバへの要求をマシンリーダブル出力を基盤にした</li>
<li>タブレットでのナビゲーションドロワーのロック</li>
<li>鍵の生成でのメールについての提案</li>
<li>公開鍵リスト内での検索</li>
<li>そしてさらなる改善と修正...</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>古いバージョンからのアップデートでクラッシュすることに対するホットフィックス</li>
</ul>
<h2>2.3</h2>
<ul>
<li>秘密鍵のエクスポート時における必要でない公開鍵のエクスポートの削除 (ありがとうAsh Hughes)</li>
<li>鍵の期限日時設定の修正 (ありがとうAsh Hughes)</li>
<li>鍵編集時のさらなる内部修正 (ありがとうAsh Hughes)</li>
<li>インポート画面から直接鍵サーバへ要求するようにした</li>
<li>Android 2.2から3.0でのレイアウトとダイアログスタイルの修正</li>
<li>空ユーザIDの鍵でのクラッシュ修正</li>
<li>署名画面から戻ってきたときにリストが空だとクラッシュするのを修正</li>
<li>Bouncy Castle (cryptography library) を1.47 から 1.50アップデートおよびソースからのビルド</li>
<li>署名画面からの鍵のアップロード修正</li>
</ul>
<h2>2.2</h2>
<ul>
<li>ナビゲーションドロワー付きの新しいデザイン</li>
<li>新しい公開鍵リストデザイン</li>
<li>新しい公開鍵ビュー</li>
<li>鍵のインポート時のバグ修正</li>
<li>鍵のクロス証明 (ありがとうAsh Hughes)</li>
<li>適切な UTF-8 パスワード処理 (ありがとうAsh Hughes)</li>
<li>新しい言語での最初のバージョン (ありがとうTransifexの貢献者達)</li>
<li>QRコードによる鍵共有の修正と改善</li>
<li>APIでのパッケージ署名検証</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>APIアップデート、K-9 Mail統合準備</li>
</ul>
<h2>2.1</h2>
<ul>
<li>たくさんのバグ修正</li>
<li>開発者向け新API</li>
<li>Googleによる擬似乱数生成器バグの修正</li>
</ul>
<h2>2.0</h2>
<ul>
<li>再デザイン完了</li>
<li>QRコード、NFCビームでの公開鍵共有</li>
<li>鍵への署名</li>
<li>鍵サーバへアップロード</li>
<li>インポート問題修正</li>
<li>新しいAIDL API</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>鍵サーバの基本サポート</li>
<li>App2SD</li>
<li>パスフレーズのキャッシュ時間についての選択肢追加: 1,2,4,8時間</li>
<li>翻訳: ノルウェー語 (ありがとう、Sander Danielsen)、中国語 (ありがとう、Zhang Fredrick) 追加</li>
<li>バグ修正</li>
<li>最適化</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>改行を含まないテキストの署名検証問題の修正</li>
<li>パスフレーズのキャッシュ生存時間 (20,40,60分) のオプション追加</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Froyo でのアカウント追加時クラッシュの修正</li>
<li>セキュアファイル削除</li>
<li>鍵ファイルインポート後の削除オプション</li>
<li>ストリーム暗号化/復号化 (ギャラリーなど)</li>
<li>新しいオプション (言語、強制V3署名)</li>
<li>インタフェース変更</li>
<li>バグ修正</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>ドイツ語およびイタリア語翻訳追加</li>
<li>BCソースが重複してしまっていたことによる、より小さいパッケージ化</li>
<li>新しい設定GUI</li>
<li>ローカライズでのレイアウトを適合化</li>
<li>署名バグ修正</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>クエリービルダーによるSDKのいくつかのバグによるクラッシュの修正</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>鍵エクスポートできる時と暗号化/署名中のクラッシュ修正</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>鍵リストのフィルタ可能化</li>
<li>暗号化鍵の事前選択のよりスマートな実装</li>
<li>VIEWおよびSENDについて新しいインテントのハンドリング、ファイルマネージャ外のファイルを暗号化/復号化するのを受け付けるようになる。</li>
<li>K-9 Mailにおける修正と追加機能 (鍵事前選択)、新しいベータビルド提供</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>1.0.0で壊れたGmailアカウントリストアップを再度修正</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>K-9 Mail 統合、K-9 MailでのAPG サポートのベータビルド</li>
<li>(ASTROを含む)ファイルマネージャのさらなるサポート</li>
<li>スロベニア語翻訳追加</li>
<li>より早くてメモリ使用量の少ない新しいデータベース</li>
<li>他のアプリでのインテントおよびコンテンツプロバイダの定義</li>
<li>バグ修正</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integration of QR Scanner (New permissions required)
* Improved key creation wizard
* Fix missing contacts after sync
* Requires Android 4
* Redesigned key screen
* Simplify crypto preferences, better selection of secure ciphers
* API: Detached signatures, free selection of signing key,...
* Fix: Some valid keys were shown revoked or expired
* Don't accept signatures by expired or revoked subkeys
* Keybase.io support in advanced view
## 3.1.2
* Fix key export to files (now for real)
## 3.1.1
* Fix key export to files (they were written partially)
* Fix crash on Android 2.3
## 3.1
* Fix crash on Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Better handling of large key imports
* Improved subkey selection
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>How do I activate OpenKeychain in K-9 Mail?</h2>
<p>To use OpenKeychain with K-9 Mail, you want to follow these steps:</p>
<ol>
<li>Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.</li>
<li>Select "Account settings" and scroll to the very bottom and click "Cryptography".</li>
<li>Click on "OpenPGP Provider" and select OpenKeychain from the list.</li>
</ol>
<h2>OpenKeychainでバグを見付けた!</h2>
<p><a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">OpenKeychainのIssueトラッカー</a>を使ってバグレポートを送ってください。</p>
<h2>寄贈</h2>
<p>もし、あなたが OpenKeychain の開発を助け、コードを寄贈するというなら、<a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">Githubのミニガイドを確認</a>して下さい。</p>
<h2>翻訳</h2>
<p>OpenKeychainの翻訳を助けてください! <a href="https://www.transifex.com/projects/p/openpgp-keychain/">TransifexのOpenKeychainプロジェクト</a>に誰でも参加できます。</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## How do I activate OpenKeychain in K-9 Mail?
To use OpenKeychain with K-9 Mail, you want to follow these steps:
1. Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.
2. Select "Account settings" and scroll to the very bottom and click "Cryptography".
3. Click on "OpenPGP Provider" and select OpenKeychain from the list.
## I found a bug in OpenKeychain!
Please report the bug using the [issue tracker of OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribute
If you want to help us developing OpenKeychain by contributing code [follow our small guide on Github](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Translations
Help translating OpenKeychain! Everybody can participate at [OpenKeychain on Transifex](https://www.transifex.com/projects/p/openpgp-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> is een OpenPGP implementatie voor Android.</p>
<p>Licentie: GPLv3+</p>
<h2>Ontwikkelaars</h2>
<ul>
<li>Dominik Schürmann (beheerder)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Bibliotheken</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (MIT X11 Licentie)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">SafeSlinger Exchange library</a> (MIT-licentie)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Support Libraries</a> (Apache Licentie v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Apache-licentie v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Apache-licentie v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Apache-licentie v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Apache Licentie v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Apache Licentie v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Apache Licentie v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (Material Design)</a> (Apache Licentie v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Apache Licentie v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (MIT Licentie)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Apache Licentie v2)</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) is een OpenPGP implementatie voor Android.
Licentie: GPLv3+
## Ontwikkelaars
* Dominik Schürmann (beheerder)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Bibliotheken
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (MIT X11 licentie)
* [SafeSlinger Exchange library](https://github.com/SafeSlingerProject/exchange-android) (MIT licentie)
* [Android Support Libraries](http://developer.android.com/tools/support-library/index.html) (Apache licentie v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Apache licentie v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Apache licentie v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Apache licentie v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Apache licentie v2)
* [ZXing](https://github.com/zxing/zxing) (Apache licentie v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Apache licentie v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Material Design)</a> (Apache licentie v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Apache licentie v2)
* [Snackbar](https://github.com/nispok/snackbar) (MIT licentie)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Apache licentie v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Apache licentie v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Apache licentie v2)

View File

@@ -0,0 +1,27 @@
## Key Confirmation
Without confirmation, you cannot be sure if a key really corresponds to a specific person.
The most simplest way to confirm a key is by scanning the QR Code or exchanging it via NFC.
To confirm keys between more than two persons, we suggest to use the key exchange method available for your keys.
## Key Status
<img src="status_signature_verified_cutout_24dp"/>
Confirmed: You have already confirmed this key, e.g., by scanning the QR Code.
<img src="status_signature_unverified_cutout_24dp"/>
Unconfirmed: This key has not been confirmed yet. You cannot be sure if the key really corresponds to a specific person.
<img src="status_signature_expired_cutout_24dp"/>
Expired: This key is no longer valid. Only the owner can extend its validity.
<img src="status_signature_revoked_cutout_24dp"/>
Revoked: This key is no longer valid. It has been revoked by its owner.
## Advanced Information
A "key confirmation" in OpenKeychain is implemented by creating a certification according to the OpenPGP standard.
This certification is a ["generic certification (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) described in the standard by:
"The issuer of this certification does not make any particular assertion as to how well the certifier has checked that the owner of the key is in fact the person described by the User ID."
Traditionally, certifications (also with higher certification levels, such as "positive certifications" (0x13)) are organized in OpenPGP's Web of Trust.
Our model of key confirmation is a much simpler concept to avoid common usability problems related to this Web of Trust.
We assume that keys are verified only to a certain degree that is still usable enough to be executed "on the go".
We also do not implement (potentially transitive) trust signatures or an ownertrust database like in GnuPG.
Furthermore, keys which contain at least one user ID certified by a trusted key will be marked as "confirmed" in the key listings.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>Oplossing voor exporteren van sleutels naar bestanden (deze keer echt)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>Oplossing voor exporteren van sleutels naar bestanden (ze werden maar gedeeltelijk geschreven)</li>
<li>Oplossing voor crash op Android 2.3</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Oplossing voor crash op Android 5</li>
<li>Nieuw certificeerscherm</li>
<li>Veilig uitwisselen vanuit sleutellijst (SafeSlinger bibliotheek)</li>
<li>Nieuwe QR code programma flow</li>
<li>Nieuw design voor ontcijferingsscherm</li>
<li>Nieuw icoon en kleuren</li>
<li>Oplossing voor importeren van geheime sleutels van Symantec Encryption Desktop</li>
<li>Subsleutel-ID's op Yubikeys worden nu currect gecontroleerd</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>Grote sleutelimportaties worden beter behandeld</li>
<li>Subsleutelselectie verbeterd</li>
</ul>
<h2>3.0</h2>
<ul>
<li>Volledige ondersteuning voor Yubikey ondertekeningsgeneratie en ontcijfering!</li>
<li>Stel installeerbare compatibele apps voor in apps-lijst</li>
<li>Nieuw design voor ontcijferingsschermen</li>
<li>Veel oplossingen voor sleutelimporteren, lost ook gestripte sleutels op</li>
<li>Eer en toon sleutelauthenticatievlaggen</li>
<li>Gebruikersinterface om eigen sleutels aan te maken</li>
<li>Oplossing voor gebruikers-ID-intrekkingscertificaten</li>
<li>Nieuwe cloud search (zoekt op traditionele sleutelservers en keybase.io)</li>
<li>Ondersteuning voor strippen van sleutels in OpenKeychain</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>Oplossing voor gebroken sleutels in 2.9.1</li>
<li>Yubikey ontsleuteling werkt nu via API</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>Deel versleutelingsscherm in twee</li>
<li>Oplossing voor sleutelvlaggen (ondersteunt nu Mailvelope 0.7 sleutels)</li>
<li>Verbeterde behandeling van wachtwoorden</li>
<li>Sleutels delen via SafeSlinger</li>
<li>Yubikey: optie om andere PINs toe te staan, momenteel werkt enkel ondertekenen via de OpenPGP API, niet in OpenKeychain zelf</li>
<li>Oplossing voor gestripte sleutels</li>
<li>SHA256 als standaard voor compatibiliteit</li>
<li>Intent API is veranderd, zie https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>OpenPGP API behandelt nu ingetrokken/verlopen sleutels en geeft alle gebruikers-ID's weer</li>
</ul>
<h2>2.9</h2>
<ul>
<li>Oplossing voor crashes geïntroduceerd in v2.8</li>
<li>Experimentele ondersteuning voor ECC</li>
<li>Experimentele ondersteuning voor Yubikey (alleen ondertekenen met geïmporteerde sleutels)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>Er zijn zoveel bugs opgelost in deze release dat we kunnen focussen op de belangrijke nieuwe mogelijkheden</li>
<li>Sleutels wijzigen: nieuw design, sleutels intrekken</li>
<li>Sleutels importeren: nieuw design, veilige verbindingen met sleutelservers via hkps, sleutelserver resolving via DNS SRV records</li>
<li>Nieuw eerste gebruiksscherm</li>
<li>Nieuw scherm voor sleutels aanmaken: automatisch aanvullen van naam en e-mailadres gebaseerd op persoonlijke Android-accounts</li>
<li>Bestandsversleuteling: nieuw design, ondersteuning voor versleutelen van meerdere bestanden</li>
<li>Nieuwe iconen om sleutelstatus weer te geven (door Brennan Novak)</li>
<li>Belangrijke bugfix: importeren van grote sleutelbossen uit een bestand is nu mogelijk</li>
<li>Melding om gecachete wachtwoorden weer te geven</li>
<li>Sleutels worden verbonden aan Android's contacten</li>
</ul>
<p>Deze release zou niet mogelijk zijn zonder het werkt van Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
<h2>2.7</h2>
<ul>
<li>Paars! (Dominik, Vincent)</li>
<li>Nieuw design voor bekijken van sleutels (Dominik, Vincent)</li>
<li>Nieuwe platte Android-knoppen (Dominik, Vincent)</li>
<li>API-oplossingen (Dominik)</li>
<li>Importeren uit keybase.io (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>Enkele oplossingen voor regressies</li>
</ul>
<h2>2.6</h2>
<ul>
<li>Sleutelcertificaties (dank aan Vincent Breitmoser)</li>
<li>Ondersteuning voor GnuPG gedeeltelijke geheime sleutels (dank aan Vincent Breitmoser)</li>
<li>Nieuw design voor ondertekeningsverificatie</li>
<li>Aangepaste sleutellengte (dank aan Greg Witczak)</li>
<li>Oplossing voor delen vanuit andere apps</li>
</ul>
<h2>2.5</h2>
<ul>
<li>Oplossing voor ontcijfering van symmetrische OpenPGP berichten/bestanden</li>
<li>Nieuw ontwerp voor sleutelbewerkingsscherm (dank aan Ash Hughes)</li>
<li>Nieuw modern design voor versleutelings/ontcijferingsschermen</li>
<li>OpenPGP API versie 3 (meerdere API accounts, interne fixes, zoeken naar sleutels)</li>
</ul>
<h2>2.4</h2>
<p>Dank aan alle deelnemers aan Google Summer of Code 2014 die deze release zo vol mogelijkheden en zonder bugs hebben gemaakt!
Buiten verschillende kleine patches, werden een groot aantal patches gemaakt door volgende personen (alfabetisch gerangschikt):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>Nieuwe geünificeerde sleutellijst</li>
<li>Gekleurde sleutelvingerafdruk</li>
<li>Ondersteuning voor sleutelserver-poorten</li>
<li>Zet mogelijkheid om zwakke sleutels aan te maken uit</li>
<li>Veel meer intern werk aan API</li>
<li>Certificeer gebruikers-ID's</li>
<li>Sleutelserverzoekopdracht gebaseerd op machine-leesbare output</li>
<li>Zet navigatiedrawer op tablets vast</li>
<li>Suggesties voor e-mailadress bij aanmaken van sleutels</li>
<li>Zoeken in publieke sleutellijsten</li>
<li>En veel more verbeteringen en fixes...</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>Hotfix voor crash bij upgraden van oude versies</li>
</ul>
<h2>2.3</h2>
<ul>
<li>Verwijder onnodige export van publieke sleutels bij exporteren van geheime sleutel (dank aan Ash Hughes)</li>
<li>Oplossing voor verloopdata op sleutels (dank aan Ash Hughes)</li>
<li>Meer interne fixes by bewerken van sleutels (dank aan Ash Hughes)</li>
<li>Zoeken op sleutelservers rechtstreeks van importscherm</li>
<li>Oplossing voor layout en dialoogstijl op Android 2.2-3.0</li>
<li>Oplossing voor crash op sleutels met lege gebruikers-ID's</li>
<li>Oplossing voor crash en lege lijsten bij terugkeren van ondertekeningsscherm</li>
<li>Bouncy Castle (cryptografie-bibliotheek) geüpdatet van 1.47 naar 1.50 en built from source</li>
<li>Oplossing voor uploaden van sleutel van ondertekeningsscherm</li>
</ul>
<h2>2.2</h2>
<ul>
<li>Nieuw design met navigatiebalk</li>
<li>Nieuw publieke sleutellijst design</li>
<li>Nieuwe publieke sleutel view</li>
<li>Bugfixes voor importeren van sleutels</li>
<li>Sleutel certificatie (dank aan Ash Hughes)</li>
<li>Behandel UTF-8 wachtwoorden correct (dank aan Ash Hughes)</li>
<li>Eerste versie met nieuwe talen (dank aan de medewerkers op Transifex)</li>
<li>Delen van sleutels via QR codes opgelost en verbeterd</li>
<li>Pakketondertekeningsverificatie voor API</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>API updates, voorbereiding voor K-9 Mail integratie</li>
</ul>
<h2>2.1</h2>
<ul>
<li>Veel bugfixes</li>
<li>Nieuwe API voor ontwikkelaars</li>
<li>PRNG bug fix door Google</li>
</ul>
<h2>2.0</h2>
<ul>
<li>Volledig nieuw design</li>
<li>Publieke sleutels delen via QR codes, NFC beam</li>
<li>Sleutels ondertekenen</li>
<li>Upload sleutels naar server</li>
<li>Importeerproblemen opgelost</li>
<li>Nieuwe AIDL API</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>Basisondersteuning voor sleutelservers</li>
<li>App2SD</li>
<li>Meer keuzes voor wachtwoordcache: 1, 2, 4, 8 uur</li>
<li>Vertalingen: Noors (bedankt, Sander Danielsen), Chinees (bedankt, Zhang Fredrick)</li>
<li>Bugfixes</li>
<li>Optimalisaties</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>Probleem met ondertekeningsverificatie van text met achterlopende newline opgelost</li>
<li>Meer opties voor wachtwoord cachetijd (20, 40, 60 min.)</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Crash bij toevoegen van account op Froyo opgelost</li>
<li>Veilige bestandsverwijdering</li>
<li>Optie om sleutelbestand na importeren te verwijderen</li>
<li>Stream versleuteling/ontcijfering (galerij, enz.)</li>
<li>Nieuwe opties (taal, forceer v3 ondertekeningen)</li>
<li>Wijzigingen in interface</li>
<li>Bugfixes</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>Duitse en Italiaanse vertaling</li>
<li>Veel kleiner pakket, door verminderde BC bronnen</li>
<li>Nieuwe GUI voor voorkeuren</li>
<li>Layout wijzigingen voor localisatie</li>
<li>Bugfix voor ondertekeningen</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>Een andere crash veroorzaakt door een SDK bug met de query builder opgelost</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>Crashes tijdens versleuteling/ondertekenen en mogelijk sleutelexportatie opgelost</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>Filterbare sleutellijsten</li>
<li>Slimmere preselectie van cryptosleutels</li>
<li>Nieuwe Intents voor VIEW en SEND, laat toe bestanden te versleutelen/ontcijferen vanuit bestandsbeheerders</li>
<li>Oplossingen en nieuwe functies (sleutel preselectie) voor K-9 Mail, nieuwe beta build beschikbaar</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>Oplijsten van GMail accounts werkte niet in 1.0.0, opgelost</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>K-9 Mail integratie, APG ondersteuning voor beta build van K-9 Mail</li>
<li>Ondersteuning voor meer bestandsbeheerders (waaronder ASTRO)</li>
<li>Sloveense vertaling</li>
<li>Nieuwe database, veel sneller, minder geheugengebruik</li>
<li>Intents en content provider voor andere apps gedefinieerd</li>
<li>Bugfixes</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integratie van QR-scanner (nieuwe machtigingen vereist)
* Sleutelaanmaakwizard verbeterd
* Probleem met ontbrekende contacten na synchronisatie opgelost
* Vereist Android 4
* Nieuw design voor sleutelscherm
* Cryptovoorkeuren vereenvoudigd, betere selectie van veilige ciphers
* API: ondertekeningen ontkoppeld, vrije selectie van ondertekeningssleutel, ...
* Oplossing voor probleem waarbij sommige geldige sleutels weergegeven werden als ingetrokken of verlopen
* Aanvaard geen ondertekeningen door verlopen of ingetrokken subsleutels
* Ondersteuning voor Keybase.io in geavanceerde modus
## 3.1.2
* Oplossing voor exporteren van sleutels naar bestanden (deze keer echt)
## 3.1.1
* Oplossing voor exporteren van sleutels naar bestanden (ze werden maar gedeeltelijk geschreven)
* Oplossing voor crash op Android 2.3
## 3.1
* Oplossing voor crash op Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Grote sleutelimportaties worden beter behandeld
* Subsleutelselectie verbeterd
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Oplossing voor gebroken sleutels in 2.9.1
* Yubikey-ontsleuteling werkt nu via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Oplossing voor crashes geïntroduceerd in v2.8
* Experimentele ondersteuning voor ECC
* Experimentele ondersteuning voor Yubikey (alleen ondertekenen met geïmporteerde sleutels)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Enkele oplossingen voor regressies
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix voor crash bij upgraden van oude versies
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API updates, voorbereiding voor K-9 Mail integratie
## 2.1
* Veel bugfixes
* Nieuwe API voor ontwikkelaars
* PRNG bug fix door Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Probleem met ondertekeningsverificatie van text met achterlopende newline opgelost
* Meer opties voor wachtwoord cachetijd (20, 40, 60 min.)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Een andere crash veroorzaakt door een SDK-bug met de query builder opgelost
## 1.0.3
* Crashes tijdens versleuteling/ondertekenen en mogelijk sleutelexportatie opgelost
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account lijsten was stuk in 1.0.0, weer opgelost
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>Hoe activeer ik OpenKeychain in K-9 Mail?</h2>
<p>Volg deze stappen om OpenKeychain te gebruiken met K-9 Mail:</p>
<ol>
<li>Open K-9 Mail en druk lang op de account waarmee je OpenKeychain wil gebruiken.</li>
<li>Selecteer "Accountinstellingen", scroll helemaal naar beneden en klik op "Cryptografie".</li>
<li>Klik op "OpenPGP-provider" en selecteer OpenKeychain in de lijst.</li>
</ol>
<h2>Ik heb een bug in OpenKeychain gevonden!</h2>
<p>Rapporteer de bug met de <a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">problemen tracker van OpenKeychain</a>.</p>
<h2>Bijdragen</h2>
<p>Als je ons wil helpen om OpenKeychain te ontwikkelen door code bij te dragen, <a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">volg onze kleine gids op Github</a>.</p>
<h2>Vertalingen</h2>
<p>Help OpenKeychain te vertalen! Iedereen kan deelnemen op <a href="https://www.transifex.com/projects/p/openpgp-keychain/">OpenKeychain op Transifex</a>.</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## Hoe activeer ik OpenKeychain in K-9 Mail?
Volg deze stappen om OpenKeychain te gebruiken met K-9 Mail:
1. Open K-9 Mail en druk lang op de account waarmee je OpenKeychain wil gebruiken.
2. Selecteer "Accountinstellingen", scroll helemaal naar beneden en klik op "Cryptografie".
3. Klik op "OpenPGP-provider" en selecteer OpenKeychain in de lijst.
## Ik heb een bug in OpenKeychain gevonden!
Rapporteer de bug met de [problementracker van OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Bijdragen
Als je ons wil helpen om OpenKeychain te ontwikkelen door code bij te dragen, [volg dan onze kleine gids op GitHub](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Vertalingen
Help OpenKeychain te vertalen! Iedereen kan deelnemen op [OpenKeychain op Transifex](https://www.transifex.com/projects/p/openpgp-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> jest implementacją OpenPGP pod Androida.</p>
<p>Licencja: GPLv3+</p>
<h2>Deweloperzy</h2>
<ul>
<li>Dominik Schürmann (Opiekun projektu)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Biblioteki</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (Licencja MIT X11)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">SafeSlinger Exchange library</a> (Licencja MIT)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Support Libraries</a> (Apache License v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (licencja Apache v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Licencja Apache v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Licencja Apache v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Licencja Apache v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Apache License v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Apache License v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (Material Design)</a> (Apache License v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Apache License v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (MIT License)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Apache License v2)</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) is an OpenPGP implementation for Android.
License: GPLv3+
## Developers
* Dominik Schürmann (Maintainer)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Libraries
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (MIT X11 License)
* [SafeSlinger Exchange library](https://github.com/SafeSlingerProject/exchange-android) (MIT License)
* [Android Support Libraries](http://developer.android.com/tools/support-library/index.html) (Apache License v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Apache License v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Apache License v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Apache License v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Apache License v2)
* [ZXing](https://github.com/zxing/zxing) (Apache License v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Apache License v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Material Design)</a> (Apache License v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Apache License v2)
* [Snackbar](https://github.com/nispok/snackbar) (MIT License)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Apache License v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Apache License v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Apache License v2)

View File

@@ -0,0 +1,27 @@
## Key Confirmation
Without confirmation, you cannot be sure if a key really corresponds to a specific person.
The most simplest way to confirm a key is by scanning the QR Code or exchanging it via NFC.
To confirm keys between more than two persons, we suggest to use the key exchange method available for your keys.
## Key Status
<img src="status_signature_verified_cutout_24dp"/>
Confirmed: You have already confirmed this key, e.g., by scanning the QR Code.
<img src="status_signature_unverified_cutout_24dp"/>
Unconfirmed: This key has not been confirmed yet. You cannot be sure if the key really corresponds to a specific person.
<img src="status_signature_expired_cutout_24dp"/>
Expired: This key is no longer valid. Only the owner can extend its validity.
<img src="status_signature_revoked_cutout_24dp"/>
Revoked: This key is no longer valid. It has been revoked by its owner.
## Advanced Information
A "key confirmation" in OpenKeychain is implemented by creating a certification according to the OpenPGP standard.
This certification is a ["generic certification (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) described in the standard by:
"The issuer of this certification does not make any particular assertion as to how well the certifier has checked that the owner of the key is in fact the person described by the User ID."
Traditionally, certifications (also with higher certification levels, such as "positive certifications" (0x13)) are organized in OpenPGP's Web of Trust.
Our model of key confirmation is a much simpler concept to avoid common usability problems related to this Web of Trust.
We assume that keys are verified only to a certain degree that is still usable enough to be executed "on the go".
We also do not implement (potentially transitive) trust signatures or an ownertrust database like in GnuPG.
Furthermore, keys which contain at least one user ID certified by a trusted key will be marked as "confirmed" in the key listings.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>Fix key export to files (now for real)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>Fix key export to files (they were written partially)</li>
<li>Fix crash on Android 2.3</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Fix crash on Android 5</li>
<li>New certify screen</li>
<li>Secure Exchange directly from key list (SafeSlinger library)</li>
<li>New QR Code program flow</li>
<li>Redesigned decrypt screen</li>
<li>New icon usage and colors</li>
<li>Fix import of secret keys from Symantec Encryption Desktop</li>
<li>Subkey IDs on Yubikeys are now checked correctly</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>Lepsza obsługa importowania dużych ilości kluczy</li>
<li>Poprawione wybieranie pod-kluczy</li>
</ul>
<h2>3.0</h2>
<ul>
<li>Pełna obsługa generowania podpisów i odszyfrowania Yubikey!</li>
<li>Zaproponowano instalacje aplikacji współpracujących w liście aplikacji</li>
<li>New design for decryption screens</li>
<li>Many fixes for key import, also fixes stripped keys</li>
<li>Honor and display key authenticate flags</li>
<li>User interface to generate custom keys</li>
<li>Fixing user id revocation certificates</li>
<li>New cloud search (searches over traditional keyservers and keybase.io)</li>
<li>Support for stripping keys inside OpenKeychain</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>Fix keys broken in 2.9.1</li>
<li>Yubikey decryption now working via API</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>Split encrypt screen into two</li>
<li>Fix key flags handling (now supporting Mailvelope 0.7 keys)</li>
<li>Improved passphrase handling</li>
<li>Key sharing via SafeSlinger</li>
<li>Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain</li>
<li>Fix usage of stripped keys</li>
<li>SHA256 as default for compatibility</li>
<li>Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>OpenPGP API now handles revoked/expired keys and returns all user ids</li>
</ul>
<h2>2.9</h2>
<ul>
<li>Fixing crashes introduced in v2.8</li>
<li>Experimental ECC support</li>
<li>Experimental Yubikey support (signing-only with imported keys)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>So many bugs have been fixed in this release that we focus on the main new features</li>
<li>Key edit: awesome new design, key revocation</li>
<li>Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records</li>
<li>New first time screen</li>
<li>New key creation screen: autocompletion of name and email based on your personal Android accounts</li>
<li>File encryption: awesome new design, support for encrypting multiple files</li>
<li>New icons to show status of key (by Brennan Novak)</li>
<li>Important bug fix: Importing of large key collections from a file is now possible</li>
<li>Notification showing cached passphrases</li>
<li>Keys are connected to Android's contacts</li>
</ul>
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
<h2>2.7</h2>
<ul>
<li>Purple! (Dominik, Vincent)</li>
<li>New key view design (Dominik, Vincent)</li>
<li>New flat Android buttons (Dominik, Vincent)</li>
<li>API fixes (Dominik)</li>
<li>Keybase.io import (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>Some fixes for regression bugs</li>
</ul>
<h2>2.6</h2>
<ul>
<li>Key certifications (thanks to Vincent Breitmoser)</li>
<li>Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)</li>
<li>New design for signature verification</li>
<li>Custom key length (thanks to Greg Witczak)</li>
<li>Fix share-functionality from other apps</li>
</ul>
<h2>2.5</h2>
<ul>
<li>Fix decryption of symmetric OpenPGP messages/files</li>
<li>Refactored key edit screen (thanks to Ash Hughes)</li>
<li>New modern design for encrypt/decrypt screens</li>
<li>OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)</li>
</ul>
<h2>2.4</h2>
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>New unified key list</li>
<li>Colorized key fingerprint</li>
<li>Support for keyserver ports</li>
<li>Deactivate possibility to generate weak keys</li>
<li>Much more internal work on the API</li>
<li>Certify user ids</li>
<li>Keyserver query based on machine-readable output</li>
<li>Lock navigation drawer on tablets</li>
<li>Suggestions for emails on creation of keys</li>
<li>Search in public key lists</li>
<li>And much more improvements and fixes…</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>Hotfix for crash when upgrading from old versions</li>
</ul>
<h2>2.3</h2>
<ul>
<li>Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)</li>
<li>Fix setting expiry dates on keys (thanks to Ash Hughes)</li>
<li>More internal fixes when editing keys (thanks to Ash Hughes)</li>
<li>Querying keyservers directly from the import screen</li>
<li>Fix layout and dialog style on Android 2.2-3.0</li>
<li>Fix crash on keys with empty user ids</li>
<li>Fix crash and empty lists when coming back from signing screen</li>
<li>Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source</li>
<li>Fix upload of key from signing screen</li>
</ul>
<h2>2.2</h2>
<ul>
<li>New design with navigation drawer</li>
<li>New public key list design</li>
<li>New public key view</li>
<li>Bug fixes for importing of keys</li>
<li>Key cross-certification (thanks to Ash Hughes)</li>
<li>Handle UTF-8 passwords properly (thanks to Ash Hughes)</li>
<li>First version with new languages (thanks to the contributors on Transifex)</li>
<li>Sharing of keys via QR Codes fixed and improved</li>
<li>Package signature verification for API</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>API Updates, preparation for K-9 Mail integration</li>
</ul>
<h2>2.1</h2>
<ul>
<li>Lots of bug fixes</li>
<li>New API for developers</li>
<li>PRNG bug fix by Google</li>
</ul>
<h2>2.0</h2>
<ul>
<li>Complete redesign</li>
<li>Share public keys via QR codes, NFC beam</li>
<li>Sign keys</li>
<li>Upload keys to server</li>
<li>Fixes import issues</li>
<li>New AIDL API</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>Basic keyserver support</li>
<li>App2sd</li>
<li>More choices for passphrase cache: 1, 2, 4, 8, hours</li>
<li>Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)</li>
<li>Bugfixes</li>
<li>Optimizations</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>Fixed problem with signature verification of texts with trailing newline</li>
<li>More options for passphrase cache time to live (20, 40, 60 mins)</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Account adding crash on Froyo fixed</li>
<li>Secure file deletion</li>
<li>Option to delete key file after import</li>
<li>Stream encryption/decryption (gallery, etc.)</li>
<li>New options (language, force v3 signatures)</li>
<li>Interface changes</li>
<li>Bugfixes</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>German and Italian translation</li>
<li>Much smaller package, due to reduced BC sources</li>
<li>New preferences GUI</li>
<li>Layout adjustment for localization</li>
<li>Signature bugfix</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>Fixed another crash caused by some SDK bug with query builder</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>Fixed crashes during encryption/signing and possibly key export</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>Filterable key lists</li>
<li>Smarter pre-selection of encryption keys</li>
<li>New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers</li>
<li>Fixes and additional features (key preselection) for K-9 Mail, new beta build available</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>GMail account listing was broken in 1.0.0, fixed again</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>K-9 Mail integration, APG supporting beta build of K-9 Mail</li>
<li>Support of more file managers (including ASTRO)</li>
<li>Slovenian translation</li>
<li>New database, much faster, less memory usage</li>
<li>Defined Intents and content provider for other apps</li>
<li>Bugfixes</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integration of QR Scanner (New permissions required)
* Improved key creation wizard
* Fix missing contacts after sync
* Requires Android 4
* Redesigned key screen
* Simplify crypto preferences, better selection of secure ciphers
* API: Detached signatures, free selection of signing key,...
* Fix: Some valid keys were shown revoked or expired
* Don't accept signatures by expired or revoked subkeys
* Keybase.io support in advanced view
## 3.1.2
* Fix key export to files (now for real)
## 3.1.1
* Fix key export to files (they were written partially)
* Fix crash on Android 2.3
## 3.1
* Fix crash on Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Better handling of large key imports
* Improved subkey selection
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>How do I activate OpenKeychain in K-9 Mail?</h2>
<p>To use OpenKeychain with K-9 Mail, you want to follow these steps:</p>
<ol>
<li>Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.</li>
<li>Select "Account settings" and scroll to the very bottom and click "Cryptography".</li>
<li>Click on "OpenPGP Provider" and select OpenKeychain from the list.</li>
</ol>
<h2>Znalazłem błąd w OpenKeychain!</h2>
<p>Zgłoś błąd korzystając z <a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">systemu śledzenia błędów OpenKeychain</a>.</p>
<h2>Wkład</h2>
<p>Jeżeli chcesz pomóc nam rozwijać OpenKeychain jako programista, <a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">zapoznaj się z naszym małym poradnikiem na Githubie</a>.</p>
<h2>Tłumaczenia</h2>
<p>Pomóż przetłumaczyć OpenKeychain! Każdy może wziąć udział przez stronę <a href="https://www.transifex.com/projects/p/openpgp-keychain/">OpenKeychain w serwisie Transifex</a>.</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## How do I activate OpenKeychain in K-9 Mail?
To use OpenKeychain with K-9 Mail, you want to follow these steps:
1. Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.
2. Select "Account settings" and scroll to the very bottom and click "Cryptography".
3. Click on "OpenPGP Provider" and select OpenKeychain from the list.
## I found a bug in OpenKeychain!
Please report the bug using the [issue tracker of OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribute
If you want to help us developing OpenKeychain by contributing code [follow our small guide on Github](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Translations
Help translating OpenKeychain! Everybody can participate at [OpenKeychain on Transifex](https://www.transifex.com/projects/p/openpgp-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> is an OpenPGP implementation for Android.</p>
<p>License: GPLv3+</p>
<h2>Developers</h2>
<ul>
<li>Dominik Schürmann (Maintainer)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Libraries</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (MIT X11 License)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">SafeSlinger Exchange library</a> (MIT License)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Support Libraries</a> (Apache License v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Apache License v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Apache License v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Apache License v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Apache License v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Apache License v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Apache License v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (Material Design)</a> (Apache License v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Apache License v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (MIT License)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Apache License v2)</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) is an OpenPGP implementation for Android.
License: GPLv3+
## Developers
* Dominik Schürmann (Maintainer)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Libraries
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (MIT X11 License)
* [SafeSlinger Exchange library](https://github.com/SafeSlingerProject/exchange-android) (MIT License)
* [Android Support Libraries](http://developer.android.com/tools/support-library/index.html) (Apache License v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Apache License v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Apache License v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Apache License v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Apache License v2)
* [ZXing](https://github.com/zxing/zxing) (Apache License v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Apache License v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Material Design)</a> (Apache License v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Apache License v2)
* [Snackbar](https://github.com/nispok/snackbar) (MIT License)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Apache License v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Apache License v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Apache License v2)

View File

@@ -0,0 +1,27 @@
## Key Confirmation
Without confirmation, you cannot be sure if a key really corresponds to a specific person.
The most simplest way to confirm a key is by scanning the QR Code or exchanging it via NFC.
To confirm keys between more than two persons, we suggest to use the key exchange method available for your keys.
## Key Status
<img src="status_signature_verified_cutout_24dp"/>
Confirmed: You have already confirmed this key, e.g., by scanning the QR Code.
<img src="status_signature_unverified_cutout_24dp"/>
Unconfirmed: This key has not been confirmed yet. You cannot be sure if the key really corresponds to a specific person.
<img src="status_signature_expired_cutout_24dp"/>
Expired: This key is no longer valid. Only the owner can extend its validity.
<img src="status_signature_revoked_cutout_24dp"/>
Revoked: This key is no longer valid. It has been revoked by its owner.
## Advanced Information
A "key confirmation" in OpenKeychain is implemented by creating a certification according to the OpenPGP standard.
This certification is a ["generic certification (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) described in the standard by:
"The issuer of this certification does not make any particular assertion as to how well the certifier has checked that the owner of the key is in fact the person described by the User ID."
Traditionally, certifications (also with higher certification levels, such as "positive certifications" (0x13)) are organized in OpenPGP's Web of Trust.
Our model of key confirmation is a much simpler concept to avoid common usability problems related to this Web of Trust.
We assume that keys are verified only to a certain degree that is still usable enough to be executed "on the go".
We also do not implement (potentially transitive) trust signatures or an ownertrust database like in GnuPG.
Furthermore, keys which contain at least one user ID certified by a trusted key will be marked as "confirmed" in the key listings.

View File

@@ -1,232 +0,0 @@
<html>
<head></head>
<body>
<h2>3.1.2</h2>
<ul>
<li>Fix key export to files (now for real)</li>
</ul>
<h2>3.1.1</h2>
<ul>
<li>Fix key export to files (they were written partially)</li>
<li>Fix crash on Android 2.3</li>
</ul>
<h2>3.1</h2>
<ul>
<li>Fix crash on Android 5</li>
<li>New certify screen</li>
<li>Secure Exchange directly from key list (SafeSlinger library)</li>
<li>New QR Code program flow</li>
<li>Redesigned decrypt screen</li>
<li>New icon usage and colors</li>
<li>Fix import of secret keys from Symantec Encryption Desktop</li>
<li>Subkey IDs on Yubikeys are now checked correctly</li>
</ul>
<h2>3.0.1</h2>
<ul>
<li>Better handling of large key imports</li>
<li>Improved subkey selection</li>
</ul>
<h2>3.0</h2>
<ul>
<li>Full support for Yubikey signature generation and decryption!</li>
<li>Propose installable compatible apps in apps list</li>
<li>New design for decryption screens</li>
<li>Many fixes for key import, also fixes stripped keys</li>
<li>Honor and display key authenticate flags</li>
<li>User interface to generate custom keys</li>
<li>Fixing user id revocation certificates</li>
<li>New cloud search (searches over traditional keyservers and keybase.io)</li>
<li>Support for stripping keys inside OpenKeychain</li>
</ul>
<h2>2.9.2</h2>
<ul>
<li>Fix keys broken in 2.9.1</li>
<li>Yubikey decryption now working via API</li>
</ul>
<h2>2.9.1</h2>
<ul>
<li>Split encrypt screen into two</li>
<li>Fix key flags handling (now supporting Mailvelope 0.7 keys)</li>
<li>Improved passphrase handling</li>
<li>Key sharing via SafeSlinger</li>
<li>Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain</li>
<li>Fix usage of stripped keys</li>
<li>SHA256 as default for compatibility</li>
<li>Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API</li>
<li>OpenPGP API now handles revoked/expired keys and returns all user ids</li>
</ul>
<h2>2.9</h2>
<ul>
<li>Fixing crashes introduced in v2.8</li>
<li>Experimental ECC support</li>
<li>Experimental Yubikey support (signing-only with imported keys)</li>
</ul>
<h2>2.8</h2>
<ul>
<li>So many bugs have been fixed in this release that we focus on the main new features</li>
<li>Key edit: awesome new design, key revocation</li>
<li>Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records</li>
<li>New first time screen</li>
<li>New key creation screen: autocompletion of name and email based on your personal Android accounts</li>
<li>File encryption: awesome new design, support for encrypting multiple files</li>
<li>New icons to show status of key (by Brennan Novak)</li>
<li>Important bug fix: Importing of large key collections from a file is now possible</li>
<li>Notification showing cached passphrases</li>
<li>Keys are connected to Android's contacts</li>
</ul>
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
<h2>2.7</h2>
<ul>
<li>Purple! (Dominik, Vincent)</li>
<li>New key view design (Dominik, Vincent)</li>
<li>New flat Android buttons (Dominik, Vincent)</li>
<li>API fixes (Dominik)</li>
<li>Keybase.io import (Tim Bray)</li>
</ul>
<h2>2.6.1</h2>
<ul>
<li>Some fixes for regression bugs</li>
</ul>
<h2>2.6</h2>
<ul>
<li>Key certifications (thanks to Vincent Breitmoser)</li>
<li>Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)</li>
<li>New design for signature verification</li>
<li>Custom key length (thanks to Greg Witczak)</li>
<li>Fix share-functionality from other apps</li>
</ul>
<h2>2.5</h2>
<ul>
<li>Fix decryption of symmetric OpenPGP messages/files</li>
<li>Refactored key edit screen (thanks to Ash Hughes)</li>
<li>New modern design for encrypt/decrypt screens</li>
<li>OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)</li>
</ul>
<h2>2.4</h2>
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
<ul>
<li>New unified key list</li>
<li>Colorized key fingerprint</li>
<li>Support for keyserver ports</li>
<li>Deactivate possibility to generate weak keys</li>
<li>Much more internal work on the API</li>
<li>Certify user ids</li>
<li>Keyserver query based on machine-readable output</li>
<li>Lock navigation drawer on tablets</li>
<li>Suggestions for emails on creation of keys</li>
<li>Search in public key lists</li>
<li>And much more improvements and fixes…</li>
</ul>
<h2>2.3.1</h2>
<ul>
<li>Hotfix for crash when upgrading from old versions</li>
</ul>
<h2>2.3</h2>
<ul>
<li>Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)</li>
<li>Fix setting expiry dates on keys (thanks to Ash Hughes)</li>
<li>More internal fixes when editing keys (thanks to Ash Hughes)</li>
<li>Querying keyservers directly from the import screen</li>
<li>Fix layout and dialog style on Android 2.2-3.0</li>
<li>Fix crash on keys with empty user ids</li>
<li>Fix crash and empty lists when coming back from signing screen</li>
<li>Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source</li>
<li>Fix upload of key from signing screen</li>
</ul>
<h2>2.2</h2>
<ul>
<li>New design with navigation drawer</li>
<li>New public key list design</li>
<li>New public key view</li>
<li>Bug fixes for importing of keys</li>
<li>Key cross-certification (thanks to Ash Hughes)</li>
<li>Handle UTF-8 passwords properly (thanks to Ash Hughes)</li>
<li>First version with new languages (thanks to the contributors on Transifex)</li>
<li>Sharing of keys via QR Codes fixed and improved</li>
<li>Package signature verification for API</li>
</ul>
<h2>2.1.1</h2>
<ul>
<li>API Updates, preparation for K-9 Mail integration</li>
</ul>
<h2>2.1</h2>
<ul>
<li>Lots of bug fixes</li>
<li>New API for developers</li>
<li>PRNG bug fix by Google</li>
</ul>
<h2>2.0</h2>
<ul>
<li>Complete redesign</li>
<li>Share public keys via QR codes, NFC beam</li>
<li>Sign keys</li>
<li>Upload keys to server</li>
<li>Fixes import issues</li>
<li>New AIDL API</li>
</ul>
<h2>1.0.8</h2>
<ul>
<li>Basic keyserver support</li>
<li>App2sd</li>
<li>More choices for passphrase cache: 1, 2, 4, 8, hours</li>
<li>Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)</li>
<li>Bugfixes</li>
<li>Optimizations</li>
</ul>
<h2>1.0.7</h2>
<ul>
<li>Fixed problem with signature verification of texts with trailing newline</li>
<li>More options for passphrase cache time to live (20, 40, 60 mins)</li>
</ul>
<h2>1.0.6</h2>
<ul>
<li>Account adding crash on Froyo fixed</li>
<li>Secure file deletion</li>
<li>Option to delete key file after import</li>
<li>Stream encryption/decryption (gallery, etc.)</li>
<li>New options (language, force v3 signatures)</li>
<li>Interface changes</li>
<li>Bugfixes</li>
</ul>
<h2>1.0.5</h2>
<ul>
<li>German and Italian translation</li>
<li>Much smaller package, due to reduced BC sources</li>
<li>New preferences GUI</li>
<li>Layout adjustment for localization</li>
<li>Signature bugfix</li>
</ul>
<h2>1.0.4</h2>
<ul>
<li>Fixed another crash caused by some SDK bug with query builder</li>
</ul>
<h2>1.0.3</h2>
<ul>
<li>Fixed crashes during encryption/signing and possibly key export</li>
</ul>
<h2>1.0.2</h2>
<ul>
<li>Filterable key lists</li>
<li>Smarter pre-selection of encryption keys</li>
<li>New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers</li>
<li>Fixes and additional features (key preselection) for K-9 Mail, new beta build available</li>
</ul>
<h2>1.0.1</h2>
<ul>
<li>GMail account listing was broken in 1.0.0, fixed again</li>
</ul>
<h2>1.0.0</h2>
<ul>
<li>K-9 Mail integration, APG supporting beta build of K-9 Mail</li>
<li>Support of more file managers (including ASTRO)</li>
<li>Slovenian translation</li>
<li>New database, much faster, less memory usage</li>
<li>Defined Intents and content provider for other apps</li>
<li>Bugfixes</li>
</ul>
</body>
</html>

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integration of QR Scanner (New permissions required)
* Improved key creation wizard
* Fix missing contacts after sync
* Requires Android 4
* Redesigned key screen
* Simplify crypto preferences, better selection of secure ciphers
* API: Detached signatures, free selection of signing key,...
* Fix: Some valid keys were shown revoked or expired
* Don't accept signatures by expired or revoked subkeys
* Keybase.io support in advanced view
## 3.1.2
* Fix key export to files (now for real)
## 3.1.1
* Fix key export to files (they were written partially)
* Fix crash on Android 2.3
## 3.1
* Fix crash on Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Better handling of large key imports
* Improved subkey selection
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -1,22 +0,0 @@
<html>
<head></head>
<body>
<h2>How do I activate OpenKeychain in K-9 Mail?</h2>
<p>To use OpenKeychain with K-9 Mail, you want to follow these steps:</p>
<ol>
<li>Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.</li>
<li>Select "Account settings" and scroll to the very bottom and click "Cryptography".</li>
<li>Click on "OpenPGP Provider" and select OpenKeychain from the list.</li>
</ol>
<h2>I found a bug in OpenKeychain!</h2>
<p>Please report the bug using the <a href="https://github.com/openpgp-keychain/openpgp-keychain/issues">issue tracker of OpenKeychain</a>.</p>
<h2>Contribute</h2>
<p>If you want to help us developing OpenKeychain by contributing code <a href="https://github.com/openpgp-keychain/openpgp-keychain#contribute-code">follow our small guide on Github</a>.</p>
<h2>Translations</h2>
<p>Help translating OpenKeychain! Everybody can participate at <a href="https://www.transifex.com/projects/p/openpgp-keychain/">OpenKeychain on Transifex</a>.</p>
</body>
</html>

View File

@@ -0,0 +1,15 @@
## How do I activate OpenKeychain in K-9 Mail?
To use OpenKeychain with K-9 Mail, you want to follow these steps:
1. Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.
2. Select "Account settings" and scroll to the very bottom and click "Cryptography".
3. Click on "OpenPGP Provider" and select OpenKeychain from the list.
## I found a bug in OpenKeychain!
Please report the bug using the [issue tracker of OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribute
If you want to help us developing OpenKeychain by contributing code [follow our small guide on Github](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Translations
Help translating OpenKeychain! Everybody can participate at [OpenKeychain on Transifex](https://www.transifex.com/projects/p/openpgp-keychain/).

View File

@@ -1,61 +0,0 @@
<html>
<head></head>
<body>
<p><a href="http://www.openkeychain.org">http://www.openkeychain.org</a></p>
<p><a href="http://www.openkeychain.org">OpenKeychain</a> is an OpenPGP implementation for Android.</p>
<p>License: GPLv3+</p>
<h2>Developers</h2>
<ul>
<li>Dominik Schürmann (Maintainer)</li>
<li>Art O Cathain</li>
<li>Ash Hughes</li>
<li>Brian C. Barnes</li>
<li>Bahtiar 'kalkin' Gadimov</li>
<li>Daniel Albert</li>
<li>Daniel Hammann</li>
<li>Daniel Haß</li>
<li>Greg Witczak</li>
<li>'mar-v-in'</li>
<li>Markus Doits</li>
<li>Miroojin Bakshi</li>
<li>Nikhil Peter Raj</li>
<li>Paul Sarbinowski</li>
<li>'Senecaso'</li>
<li>Signe Rüsch</li>
<li>Sreeram Boyapati</li>
<li>Thialfihar (APG 1.x)</li>
<li>Tim Bray</li>
<li>Vincent Breitmoser</li>
</ul>
<h2>Libraries</h2>
<ul>
<li>
<a href="http://rtyley.github.com/spongycastle/">SpongyCastle</a> (MIT X11 License)</li>
<li>
<a href="https://github.com/SafeSlingerProject/exchange-android">SafeSlinger Exchange library</a> (MIT License)</li>
<li>
<a href="http://developer.android.com/tools/support-library/index.html">Android Support Libraries</a> (Apache License v2)</li>
<li>
<a href="https://github.com/timbray/KeybaseLib">KeybaseLib</a> (Apache License v2)</li>
<li>
<a href="https://github.com/splitwise/TokenAutoComplete">TokenAutoComplete</a> (Apache License v2)</li>
<li>
<a href="https://github.com/rtreffer/minidns">MiniDNS</a> (Apache License v2)</li>
<li>
<a href="https://github.com/emilsjolander/StickyListHeaders">StickyListHeaders</a> (Apache License v2)</li>
<li>
<a href="https://github.com/zxing/zxing">ZXing</a> (Apache License v2)</li>
<li>
<a href="https://github.com/journeyapps/zxing-android-embedded">ZXing Android Minimal</a> (Apache License v2)</li>
<li>
<a href="https://github.com/jpardogo/PagerSlidingTabStrip">PagerSlidingTabStrip (Material Design)</a> (Apache License v2)</li>
<li>
<a href="https://github.com/neokree/MaterialNavigationDrawer">MaterialNavigationDrawer</a> (Apache License v2)</li>
<li>
<a href="https://github.com/nispok/snackbar">Snackbar</a> (MIT License)</li>
<li>
<a href="https://github.com/futuresimple/android-floating-action-button">FloatingActionButton</a> (Apache License v2)</li>
</ul>
</body>
</html>

Some files were not shown because too many files have changed in this diff Show More