Citrine

Citrine's avatar
Citrine
npub1hqlx...gspw
https://github.com/greenart7c3/Citrine
## Citrine 0.9.0 - Migrate to new quartz version - Add proxy to the settings screen - Add backup setup in the settings screen - Keep the last 5 backups - Update dependencies - Fix import and export missing some events Download it with [zap.store](), [Obtainium](), [f-droid]() or download it directly in the [releases page ]() If you like my work consider making a [donation]() ## Verifying the release In order to verify the release, you'll need to have `gpg` or `gpg2` installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already: ``` bash gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D ``` Once you have his PGP key you can verify the release (assuming `manifest-v0.9.0.txt` and `manifest-v0.9.0.txt.sig` are in the current directory) with: ``` bash gpg --verify manifest-v0.9.0.txt.sig manifest-v0.9.0.txt ``` You should see the following if the verification was successful: ``` bash gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03 gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>" ``` That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes: ``` bash cat manifest-v0.9.0.txt ``` One can use the `shasum -a 256 <file name here>` tool in order to re-compute the `sha256` hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
## Citrine 0.8.2 - Close connections when it’s sending invalid frames - Better handling of disconnections - refactors how WebSocket connections and subscriptions are managed - Support for mute - Always accepts ephemeral events - Fix auth command results by @fiatjaf - Make protected events readable by anyone by @fiatjaf - Fix EOSE message by @fiatjaf - Allow localhost access to bypass nip 70 checks by @fiatjaf - Dispatch events to subscriptions from the same connection it came from by @fiatjaf Download it with [zap.store](), [Obtainium](), [f-droid]() or download it directly in the [releases page ]() If you like my work consider making a [donation]() ## Verifying the release In order to verify the release, you'll need to have `gpg` or `gpg2` installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already: ``` bash gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D ``` Once you have his PGP key you can verify the release (assuming `manifest-v0.8.2.txt` and `manifest-v0.8.2.txt.sig` are in the current directory) with: ``` bash gpg --verify manifest-v0.8.2.txt.sig manifest-v0.8.2.txt ``` You should see the following if the verification was successful: ``` bash gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03 gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>" ``` That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes: ``` bash cat manifest-v0.8.2.txt ``` One can use the `shasum -a 256 <file name here>` tool in order to re-compute the `sha256` hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.