Amber 3.0.1
- New design (still a work in progress)
- Removed the push notification server
- Open the permissions page with the correct account
- Fix crash when signing in with ncryptsec
- Fix icon size on notifications
- Fix relay connection when changing the default relays
- Option to setup a custom pin for the app
- Button to copy your public key
- Fix layout on Android < 15
- Fix multi event screen
- Fetch profile data
- Show relay message when event is rejected
- Fix profile icon size
- Don’t close app when using nostrconnect arcade
- Better check for valid relays
- Fix padding and scrolling
- Support for secret when using nostrconnect
- Fix empty relay notice
- Fix get_public_key not replying with hex key
- Fix relay not connecting after adding a new bunker
- Fix logout not working sometimes
- Fix login screen showing when trying to login to some applications
- Fix duplicated applications when connecting a new app
Download it with zap.store, Obtainium, f-droid or download it directly in the releases page
If you like my work consider making a donation
Verifying the release
In order to verify the release, you'll need to have gpg
or gpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:
gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
Once you have his PGP key you can verify the release (assuming manifest-v3.0.1.txt
and manifest-v3.0.1.txt.sig
are in the current directory) with:
gpg --verify manifest-v3.0.1.txt.sig manifest-v3.0.1.txt
You should see the following if the verification was successful:
gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03
gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D
gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:
cat manifest-v3.0.1.txt
One can use the shasum -a 256 <file name here>
tool in order to re-compute the sha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.