Skip to content

Releases: tyjvazum/arb

v0.2.0

13 May 22:32
v0.2.0
f476da4
Compare
Choose a tag to compare

Added

  • Add support for Envelope Expansions
  • Add write support for Arbitrary Protocol Inscriptions #1
  • Add support for Content Compression #2
  • Add support for Inscription Metadata (JSON) #6
  • Add support for Non-tracked / Non-transferable Inscriptions #8
  • Add support for Off-chain Content (BitTorrent) #9
  • Add support for Optional Title, Subtitle, Description, License, and Comment Fields

Optional PGP Verification Instructions

  1. Download tyjvazum's PGP public key here, and then import it with gpg --import "C4106BFE9B8BEB40(tyjvazum).asc" in the directory where the file is.

  2. Verify that the fingerprint is 8092 8E49 1421 22FB A2AB 4B50 C410 6BFE 9B8B EB40 with gpg --list-keys tyjvazum.

  3. Download the latest release file (currently arb-v0.2.0), for whichever platform you want (arb-v0.2.0-x86_64-unknown-linux-gnu.tar.gz, arb-v0.2.0-aarch64-apple-darwin.tar.gz, arb-v0.2.0-x86_64-apple-darwin.tar.gz, or arb-v0.2.0-x86_64-pc-windows-msvc.zip), the arb-v0.2.0-SHA256SUMS file and the corresponding arb-v0.2.0-SHA256SUMS.asc signature file.

  4. Compute the SHA-256 hash of the release file using the command sha256sum RELEASE_FILE where RELEASE_FILE is the filename of the release file being used.

  5. Make sure that the resulting hash matches the one in the arb-v0.2.0-SHA256SUMS text file.

  6. Verify the signature with gpg --verify arb-v0.2.0-SHA256SUMS.asc arb-v0.2.0-SHA256SUMS. If the message returned says Good signature from Ty Vazum and that it was signed with Primary key fingerprint: 8092 8E49 1421 22FB A2AB 4B50 C410 6BFE 9B8B EB40, then the software was not tampered with since being signed.

Note: The output from the verify command may contain WARNING: This key is not certified with a trusted signature!. You can ignore this, but if you want to fully verify your download, you need to ask people you trust to confirm that the key fingerprint belongs to Ty Vazum.

v0.1.0

05 Apr 23:00
v0.1.0
8082dbb
Compare
Choose a tag to compare

Changed

  • Branding
  • License

Fixed

  • Workflows

Optional PGP Verification Instructions

  1. Download tyjvazum's PGP public key here, and then import it with gpg --import "C4106BFE9B8BEB40(tyjvazum).asc" in the directory where the file is.

  2. Verify that the fingerprint is 8092 8E49 1421 22FB A2AB 4B50 C410 6BFE 9B8B EB40 with gpg --list-keys tyjvazum.

  3. Download the latest release file (currently arb-v0.1.0), for whichever platform you want (arb-v0.1.0-x86_64-unknown-linux-gnu.tar.gz, arb-v0.1.0-aarch64-apple-darwin.tar.gz, arb-v0.1.0-x86_64-apple-darwin.tar.gz, or arb-v0.1.0-x86_64-pc-windows-msvc.zip), the arb-v0.1.0-SHA256SUMS file and the corresponding arb-v0.1.0-SHA256SUMS.asc signature file.

  4. Compute the SHA-256 hash of the release file using the command sha256sum RELEASE_FILE where RELEASE_FILE is the filename of the release file being used.

  5. Make sure that the resulting hash matches the one in the arb-v0.1.0-SHA256SUMS text file.

  6. Verify the signature with gpg --verify arb-v0.1.0-SHA256SUMS.asc arb-v0.1.0-SHA256SUMS. If the message returned says Good signature from Ty Vazum and that it was signed with Primary key fingerprint: 8092 8E49 1421 22FB A2AB 4B50 C410 6BFE 9B8B EB40, then the software was not tampered with since being signed.

Note: The output from the verify command may contain WARNING: This key is not certified with a trusted signature!. You can ignore this, but if you want to fully verify your download, you need to ask people you trust to confirm that the key fingerprint belongs to Ty Vazum.