1
0
Fork 0
mirror of https://github.com/HACKERALERT/Picocrypt.git synced 2024-11-10 04:48:01 +00:00

Remove links

This commit is contained in:
Evan Su 2022-09-26 00:03:50 -04:00 committed by GitHub
parent 90f6148d27
commit 7b80ca0860
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -44,7 +44,7 @@
<li>✓ .deb and AppImage optimizations, reliability improvements</li> <li>✓ .deb and AppImage optimizations, reliability improvements</li>
<li>✓ Snapcraft uses software OpenGL rendering as well now</li> <li>✓ Snapcraft uses software OpenGL rendering as well now</li>
<li>✓ Statically linked libc6, etc. for best cross-platform compatibility for Snapcraft</li> <li>✓ Statically linked libc6, etc. for best cross-platform compatibility for Snapcraft</li>
<li>✓ Added NO_AT_BRIDGE=1 to Snapcraft to fix an issue on Arch Linux (<a href="https://github.com/HACKERALERT/Picocrypt/issues/75">#75</a>)</li> <li>✓ Added NO_AT_BRIDGE=1 to Snapcraft to fix an issue on Arch Linux (#75)</li>
<li>✓ Clean up unnecessary files in dependencies</li> <li>✓ Clean up unnecessary files in dependencies</li>
<li>✓ Sign executables with OpenPGP</li> <li>✓ Sign executables with OpenPGP</li>
</ul> </ul>
@ -63,7 +63,7 @@
<li>✓ Fix invalid pointer crash when decrypting files >256GB</li> <li>✓ Fix invalid pointer crash when decrypting files >256GB</li>
<li>✓ UI improvements and tweaks</li> <li>✓ UI improvements and tweaks</li>
<li>✓ Fix crash on Windows when saving to the root directory of a drive</li> <li>✓ Fix crash on Windows when saving to the root directory of a drive</li>
<li>✓ Max file size limit removed! Picocrypt can now encrypt files of unlimited size instead of being capped at 256 GiB 🥳</li> <li>✓ Max file size limit removed! Picocrypt can now encrypt files of unlimited size instead of being capped at 256 GiB</li>
<li>✓ Shows total input size along with input label</li> <li>✓ Shows total input size along with input label</li>
<li>✓ Update to GLFW 3.3.6 for better stability</li> <li>✓ Update to GLFW 3.3.6 for better stability</li>
</ul> </ul>
@ -178,7 +178,7 @@
# v1.14 (Released 08/07/2021) # v1.14 (Released 08/07/2021)
<ul> <ul>
<li>✓ Low-severity security fix for the recently discovered <a href="https://eprint.iacr.org/2020/1491.pdf">partitioning oracle attacks</a></li> <li>✓ Low-severity security fix for the recently discovered partitioning oracle attacks</li>
<li>✓ Move from Monocypher to Go's standard supplemental ChaCha20 in favour of the latter being stateful</li> <li>✓ Move from Monocypher to Go's standard supplemental ChaCha20 in favour of the latter being stateful</li>
<li>✓ Add SHA3 (normal mode) and BLAKE2b (fast mode) as HMAC to replace Poly1305 and prevent partitioning oracle attacks</li> <li>✓ Add SHA3 (normal mode) and BLAKE2b (fast mode) as HMAC to replace Poly1305 and prevent partitioning oracle attacks</li>
<li>✓ Removed ~100 lines of unnecessary code now that Picocrypt uses Go's ChaCha20 (cleaner and stabler code)</li> <li>✓ Removed ~100 lines of unnecessary code now that Picocrypt uses Go's ChaCha20 (cleaner and stabler code)</li>