Pull from transifex

This commit is contained in:
Dominik Schürmann
2015-03-23 15:54:48 +01:00
parent 4405e5fbdd
commit e2f27d0f47
114 changed files with 8860 additions and 210 deletions

View File

@@ -0,0 +1,45 @@
[http://www.openkeychain.org](http://www.openkeychain.org)
[OpenKeychain](http://www.openkeychain.org) es una implementación de OpenPGP para Android.
Licencia: GPLv3+
## Desarrolladores
* Dominik Schürmann (Mantenedor)
* Art O Cathain
* Ash Hughes
* Brian C. Barnes
* Bahtiar 'kalkin' Gadimov
* Daniel Albert
* Daniel Hammann
* Daniel Haß
* Greg Witczak
* 'mar-v-in'
* Markus Doits
* Miroojin Bakshi
* Nikhil Peter Raj
* Paul Sarbinowski
* 'Senecaso'
* Signe Rüsch
* Sreeram Boyapati
* Thialfihar (APG 1.x)
* Tim Bray
* Vincent Breitmoser
## Librerías
* [SpongyCastle](http://rtyley.github.com/spongycastle/) (Licencia MIT X11)
* [Librería SafeSlinger Exchange](https://github.com/SafeSlingerProject/exchange-android) (Licencia MIT)
* [Librerías de Soporte Android](http://developer.android.com/tools/support-library/index.html) (Licencia Apache v2)
* [KeybaseLib](https://github.com/timbray/KeybaseLib) (Licencia Apache v2)
* [TokenAutoComplete](https://github.com/splitwise/TokenAutoComplete) (Licencia Apache v2)
* [MiniDNS](https://github.com/rtreffer/minidns) (Licencia Apache v2)
* [StickyListHeaders](https://github.com/emilsjolander/StickyListHeaders) (Licencia Apache v2)
* [ZXing](https://github.com/zxing/zxing) (Licencia Apache v2)
* [ZXing Android Minimal](https://github.com/journeyapps/zxing-android-embedded) (Licencia Apache v2)
* [PagerSlidingTabStrip](https://github.com/jpardogo/PagerSlidingTabStrip) (Diseño estilo Material)</a> (Licencia Apache v2)
* [MaterialNavigationDrawer](https://github.com/neokree/MaterialNavigationDrawer) (Licencia Apache v2)
* [Snackbar](https://github.com/nispok/snackbar) (Licencia MIT)
* [FloatingActionButton](https://github.com/futuresimple/android-floating-action-button) (Licencia Apache v2)
* [HtmlTextView](https://github.com/dschuermann/html-textview) (Licencia Apache v2)
* [Markdown4J](https://github.com/jdcasey/markdown4j) (Licencia Apache v2)

View File

@@ -0,0 +1,27 @@
## Confirmación de clave
Sin confirmación, no puede estar seguro de si una clave corresponde realmente a una persona específica.
La forma más simple de confirmar una clave es escanear el código QR o intercambiarlo vía NFC.
Para confirmar claves entre más de dos personas, sugerimos usar el método de intercambio de claves disponible para sus claves.
## Estado de la clave
<img src="status_signature_verified_cutout_24dp"/>
Confirmada: Ya ha confirmado esta clave, ej. al escanear el código QR.
<img src="status_signature_unverified_cutout_24dp"/>
No confirmada: Esta clave no ha sido confirmada aún. No puede estar seguro de si la clave corresponde realmente a una persona específica.
<img src="status_signature_expired_cutout_24dp"/>
Caducada: Esta clave ya no es válida. Sólo el propietario puede extender su validez.
<img src="status_signature_revoked_cutout_24dp"/>
Revocada: Esta clave ya no es válida. Ha sido revocada por su propietario.
## Información avanzada
Una "confirmación de clave" en OpenKeychain se implementa al crear una certificación de acuerdo al estándar OpenPGP.
Esta certificación es una ["certificación genérica (0x10)"](http://tools.ietf.org/html/rfc4880#section-5.2.1) descrita en el estándar por:
"El emisor de esta certificación no hace ninguna afirmación particular acerca de lo bien o mal que el certificador ha comprobado que el propietario de la clave sea de hecho la persona descrita por la identificación del usuario."
Tradicionalmente, las certificaciones (también con niveles más altos de certificación, tales como "certificaciones positivas" (0x13)) se organizan en la Web of Trust de OpenPGP.
Nuestro modelo de confirmación de clave es un concepto mucho más simple para evitar problemas comunes de usabilidad relacionados con esta Web of Trust.
Asumimos que las claves están verificadas sólo hasta cierto grado, que no obstante es suficientemente usable para ejecutarse "sobre la marcha".
Tampoco implementamos firmas de confianza (potencialmente transitivas) o una base de datos ownertrust (de valores de confianza para el propietario) como en GnuPG.
Más aún, las claves que contengan al menos una identificación de usuario certificada por una clave de confianza se marcarán como "confirmadas" en los listados de claves.

View File

@@ -0,0 +1,268 @@
## 3.2beta2
* Material design
* Integration of QR Scanner (New permissions required)
* Improved key creation wizard
* Fix missing contacts after sync
* Requires Android 4
* Redesigned key screen
* Simplify crypto preferences, better selection of secure ciphers
* API: Detached signatures, free selection of signing key,...
* Fix: Some valid keys were shown revoked or expired
* Don't accept signatures by expired or revoked subkeys
* Keybase.io support in advanced view
## 3.1.2
* Fix key export to files (now for real)
## 3.1.1
* Fix key export to files (they were written partially)
* Fix crash on Android 2.3
## 3.1
* Fix crash on Android 5
* New certify screen
* Secure Exchange directly from key list (SafeSlinger library)
* New QR Code program flow
* Redesigned decrypt screen
* New icon usage and colors
* Fix import of secret keys from Symantec Encryption Desktop
* Subkey IDs on Yubikeys are now checked correctly
## 3.0.1
* Better handling of large key imports
* Improved subkey selection
## 3.0
* Full support for Yubikey signature generation and decryption!
* Propose installable compatible apps in apps list
* New design for decryption screens
* Many fixes for key import, also fixes stripped keys
* Honor and display key authenticate flags
* User interface to generate custom keys
* Fixing user id revocation certificates
* New cloud search (searches over traditional keyservers and keybase.io)
* Support for stripping keys inside OpenKeychain
## 2.9.2
* Fix keys broken in 2.9.1
* Yubikey decryption now working via API
## 2.9.1
* Split encrypt screen into two
* Fix key flags handling (now supporting Mailvelope 0.7 keys)
* Improved passphrase handling
* Key sharing via SafeSlinger
* Yubikey: preference to allow other PINs, currently only signing via the OpenPGP API works, not inside of OpenKeychain
* Fix usage of stripped keys
* SHA256 as default for compatibility
* Intent API has changed, see https://github.com/open-keychain/open-keychain/wiki/Intent-API
* OpenPGP API now handles revoked/expired keys and returns all user ids
## 2.9
* Fixing crashes introduced in v2.8
* Experimental ECC support
* Experimental Yubikey support (signing-only with imported keys)
## 2.8
* So many bugs have been fixed in this release that we focus on the main new features
* Key edit: awesome new design, key revocation
* Key import: awesome new design, secure keyserver connections via hkps, keyserver resolving via DNS SRV records
* New first time screen
* New key creation screen: autocompletion of name and email based on your personal Android accounts
* File encryption: awesome new design, support for encrypting multiple files
* New icons to show status of key (by Brennan Novak)
* Important bug fix: Importing of large key collections from a file is now possible
* Notification showing cached passphrases
* Keys are connected to Android's contacts
<p>This release wouldn't be possible without the work of Vincent Breitmoser (GSoC 2014), mar-v-in (GSoC 2014), Daniel Albert, Art O Cathain, Daniel Haß, Tim Bray, Thialfihar</p>
## 2.7
* Purple! (Dominik, Vincent)
* New key view design (Dominik, Vincent)
* New flat Android buttons (Dominik, Vincent)
* API fixes (Dominik)
* Keybase.io import (Tim Bray)
## 2.6.1
* Some fixes for regression bugs
## 2.6
* Key certifications (thanks to Vincent Breitmoser)
* Support for GnuPG partial secret keys (thanks to Vincent Breitmoser)
* New design for signature verification
* Custom key length (thanks to Greg Witczak)
* Fix share-functionality from other apps
## 2.5
* Fix decryption of symmetric OpenPGP messages/files
* Refactored key edit screen (thanks to Ash Hughes)
* New modern design for encrypt/decrypt screens
* OpenPGP API version 3 (multiple api accounts, internal fixes, key lookup)
## 2.4
<p>Thanks to all applicants of Google Summer of Code 2014 who made this release feature rich and bug free!
Besides several small patches, a notable number of patches are made by the following people (in alphabetical order):
Daniel Hammann, Daniel Haß, Greg Witczak, Miroojin Bakshi, Nikhil Peter Raj, Paul Sarbinowski, Sreeram Boyapati, Vincent Breitmoser.</p>
* New unified key list
* Colorized key fingerprint
* Support for keyserver ports
* Deactivate possibility to generate weak keys
* Much more internal work on the API
* Certify user ids
* Keyserver query based on machine-readable output
* Lock navigation drawer on tablets
* Suggestions for emails on creation of keys
* Search in public key lists
* And much more improvements and fixes…
## 2.3.1
* Hotfix for crash when upgrading from old versions
## 2.3
* Remove unnecessary export of public keys when exporting secret key (thanks to Ash Hughes)
* Fix setting expiry dates on keys (thanks to Ash Hughes)
* More internal fixes when editing keys (thanks to Ash Hughes)
* Querying keyservers directly from the import screen
* Fix layout and dialog style on Android 2.2-3.0
* Fix crash on keys with empty user ids
* Fix crash and empty lists when coming back from signing screen
* Bouncy Castle (cryptography library) updated from 1.47 to 1.50 and build from source
* Fix upload of key from signing screen
## 2.2
* New design with navigation drawer
* New public key list design
* New public key view
* Bug fixes for importing of keys
* Key cross-certification (thanks to Ash Hughes)
* Handle UTF-8 passwords properly (thanks to Ash Hughes)
* First version with new languages (thanks to the contributors on Transifex)
* Sharing of keys via QR Codes fixed and improved
* Package signature verification for API
## 2.1.1
* API Updates, preparation for K-9 Mail integration
## 2.1
* Lots of bug fixes
* New API for developers
* PRNG bug fix by Google
## 2.0
* Complete redesign
* Share public keys via QR codes, NFC beam
* Sign keys
* Upload keys to server
* Fixes import issues
* New AIDL API
## 1.0.8
* Basic keyserver support
* App2sd
* More choices for passphrase cache: 1, 2, 4, 8, hours
* Translations: Norwegian (thanks, Sander Danielsen), Chinese (thanks, Zhang Fredrick)
* Bugfixes
* Optimizations
## 1.0.7
* Fixed problem with signature verification of texts with trailing newline
* More options for passphrase cache time to live (20, 40, 60 mins)
## 1.0.6
* Account adding crash on Froyo fixed
* Secure file deletion
* Option to delete key file after import
* Stream encryption/decryption (gallery, etc.)
* New options (language, force v3 signatures)
* Interface changes
* Bugfixes
## 1.0.5
* German and Italian translation
* Much smaller package, due to reduced BC sources
* New preferences GUI
* Layout adjustment for localization
* Signature bugfix
## 1.0.4
* Fixed another crash caused by some SDK bug with query builder
## 1.0.3
* Fixed crashes during encryption/signing and possibly key export
## 1.0.2
* Filterable key lists
* Smarter pre-selection of encryption keys
* New Intent handling for VIEW and SEND, allows files to be encrypted/decrypted out of file managers
* Fixes and additional features (key preselection) for K-9 Mail, new beta build available
## 1.0.1
* GMail account listing was broken in 1.0.0, fixed again
## 1.0.0
* K-9 Mail integration, APG supporting beta build of K-9 Mail
* Support of more file managers (including ASTRO)
* Slovenian translation
* New database, much faster, less memory usage
* Defined Intents and content provider for other apps
* Bugfixes

View File

@@ -0,0 +1,15 @@
## How do I activate OpenKeychain in K-9 Mail?
To use OpenKeychain with K-9 Mail, you want to follow these steps:
1. Open K-9 Mail and long-tap on the account you want to use OpenKeychain with.
2. Select "Account settings" and scroll to the very bottom and click "Cryptography".
3. Click on "OpenPGP Provider" and select OpenKeychain from the list.
## I found a bug in OpenKeychain!
Please report the bug using the [issue tracker of OpenKeychain](https://github.com/openpgp-keychain/openpgp-keychain/issues).
## Contribute
If you want to help us developing OpenKeychain by contributing code [follow our small guide on Github](https://github.com/openpgp-keychain/openpgp-keychain#contribute-code).
## Translations
Help translating OpenKeychain! Everybody can participate at [OpenKeychain on Transifex](https://www.transifex.com/projects/p/openpgp-keychain/).