github greenart7c3/Amber v4.0.3-pre1
Release v4.0.3-pre1

pre-release16 hours ago

Amber 4.0.3-pre1

  • Fix close application logic for bunkers
  • Add a Export/Import accounts method by @npub1acr7ycax3t7ne8xzt0kfhh33cfd5z4h8z3ntk00erpd7zxlqzy3qrn2tqw
  • Separate relay reqs per account
  • Update relay reqs when adding an account
  • New encryption/decryption ui
  • Support for ping requests when using bunker
  • Fix encryption type by @npub1zafcms4xya5ap9zr7xxr0jlrtrattwlesytn2s42030lzu0dwlzqpd26k5
  • Separate logs and history tables in it's own databases
  • Add crash reporting
  • Try to get the saved account in the get public key of the content provider
  • Use quartz from maven
  • Save logs when there's a error using content provider
  • Add a text to the relays page floating button
  • Show the relays used by apps

Download it with zapstore.dev, Obtainium, f-droid or download it directly in the releases page

If you like my work consider making a donation

Verifying the release

In order to verify the release, you'll need to have gpg or gpg2 installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:

gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D

Once you have his PGP key you can verify the release (assuming manifest-v4.0.3-pre1.txt and manifest-v4.0.3-pre1.txt.sig are in the current directory) with:

gpg --verify manifest-v4.0.3-pre1.txt.sig manifest-v4.0.3-pre1.txt

You should see the following if the verification was successful:

gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03
gpg:                using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D
gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"

That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:

cat manifest-v4.0.3-pre1.txt

One can use the shasum -a 256 <file name here> tool in order to re-compute the sha256 hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.

Don't miss a new Amber release

NewReleases is sending notifications on new releases.