Version | Change log |
Gpg4win 4.3.1 Mar 12, 2024 | |
Gpg4win 4.3.0 Jan 26, 2024 | |
Gpg4win 4.2.0 Jul 14, 2023 |
Okular (GnuPG Edition): Gpg4win has been extended with the popular Okular PDF Viewer. Although our Okular version is currently considered experimental and therefore not installed by default, this provides the ability to legally sign and verify documents with the S/MIME certificates and smart cards GnuPG supports. The GnuPG Edition of Okular is optimized to be lightweight and to provide as little attack surface as possible. It does not support any active content like JavaScript or media files in PDF documents. It should therefore be more suitable in high security environments than other PDF readers. GnuPG: The new component "keyboxd" is now enabled by default for new users of Gpg4win. keyboxd stores certificates (public keys) in an sqlite database and keeps it in memory. The resulting performance improvement can be quite large especially for users with large keyrings. Adventuresome users can enable it manually. |
Gpg4win 4.1.0 Dec 20, 2022 | |
Gpg4win 4.0.4 Oct 17, 2022 | |
Gpg4win 4.0.3 Jul 12, 2022 | |
Gpg4win 4.0.2 Apr 25, 2022 | |
Gpg4win 4.0.0 Dec 21, 2021 | |
Gpg4win 3.1.15 Jan 12, 2021 |
The dialog to create new keys has been simplified and makes it easier to create keys without protection. This can be disabled by setting "enforce-passphrase-constraints" in the gpg-agent configuration. (T5181) Name and e-mail for new keys are now obtained through active directory if they are available. (T5181) Creating S/MIME CSRs for OpenPGP Smartcards has been further improved. (T5127) Tag support for certifications has been greatly improved and is now also available when adding keys in the file encrypt dialog. (T5174) Elevated execution of Kleopatra (run as Administrator) is now prevented to avoid accidental permission problems in the GnuPG data folder. (T5212) Setting the initial SigG PIN for NetKey cards now also works if the generic PIN is not set. (T5220) |
Gpg4win 3.1.11 Mar 29, 2019 |
GpgOL: Fixed a possible plaintext leak to the mail server, which could occur when opening and closing mails while the mail was also visible in the message list. (T4622 T4621) GnuPG: Ignore all key-signatures received from keyservers. This change is required to mitigate a DoS due to keys flooded with faked key-signatures. The old behaviour can be achieved by adding keyserver-options no-self-sigs-only,no-import-clean to your gpg.conf. (T4607) See: https://wiki.gnupg.org/WKD for an alternative to the keyservers. GnuPG: Updated to Version 2.2.17. (See: https://gnupg.org for News.) |