- Jul 08, 2016
-
-
Torsten Grote authored
* Explain what "account creation" means on first run * Use hints instead of dedicated text views * Move password strength meter up into the user's view * Always move user's view to current input field * Improve "Forgot Password" dialog Closes #151
-
- May 11, 2016
-
-
akwizgran authored
-
Ernir Erlingsson authored
-
Ernir Erlingsson authored
-
Ernir Erlingsson authored
-
Ernir Erlingsson authored
-
Ernir Erlingsson authored
-
Ernir Erlingsson authored
Switched AppBus for ResultHandler, Controller for Helper. Added the basics for LifecycleControllers and implemented it for BriarActivity and NavDrawerActivity
-
Ernir Erlingsson authored
-
Ernir Erlingsson authored
-
Ernir Erlingsson authored
-
Ernir Erlingsson authored
-
- Mar 14, 2016
-
-
Ernir Erlingsson authored
Modified the project structure, removed module extension and went instead for a non-complete core dependency graph
-
Ernir Erlingsson authored
-
- Jan 21, 2016
-
-
Ernir Erlingsson authored
-
- Jan 08, 2016
-
-
akwizgran authored
Also removed some unused code from BaseActivity.
-
- Jan 07, 2016
-
-
Torsten Grote authored
-
Torsten Grote authored
* removing screen border visible on small screens * showing noticeable error message on wrong password input * showing keyboard again after entering wrong password * making lost password link easier to recognize as link * renaming keyboard toggle method from 'hide' to 'toggle'
-
- Dec 31, 2015
- Dec 17, 2015
- Dec 14, 2015
-
-
Ernir Erlingsson authored
-
- Dec 10, 2015
-
-
akwizgran authored
Removed methods that are no longer needed for Java 6, moved the remaining method into the utils directory.
-
- Dec 08, 2015
- Nov 30, 2015
-
-
akwizgran authored
-
- Apr 29, 2015
-
-
akwizgran authored
-
- Mar 23, 2015
-
-
akwizgran authored
-
- Jan 14, 2015
-
-
akwizgran authored
-
- Dec 29, 2014
-
-
akwizgran authored
1. The things we're really trying to protect - contact identities, message contents, etc - can't be erased from memory because they're encapsulated inside objects we don't control. 2. Long-term secrets can't be protected by erasing them from memory because they're stored in the database and the database key has to be held in memory whenever the app's running. 3. If the runtime uses a compacting garbage collector then we have no way to ensure an object is erased from memory. 4. Trying to erase secrets from memory makes the code more complex. Conclusion: Let's not try to protect secrets from an attacker who can read arbitrary memory locations.
-
- May 09, 2014
-
-
akwizgran authored
-
- Apr 30, 2014
-
-
akwizgran authored
-
- Apr 07, 2014
-
-
akwizgran authored
Thanks to the team that audited CryptoCat for this idea. :-)
-
- Apr 05, 2014
-
-
akwizgran authored
-
- Mar 10, 2014
-
-
akwizgran authored
-
- Mar 01, 2014
-
-
akwizgran authored
-
- Feb 27, 2014
-
-
akwizgran authored
-
- Feb 11, 2014
-
-
akwizgran authored
-