The LOG files are now consolidated into a new ExceptionLog file with more accurate information.
The CHANGE AUTHORIZATION window accepts now the DEL key to remove people from being added or removed from files.
Fixed the status of the VERIFY gauge, which was missing when encrypting huge files with the OBAKE-512 algorithm.
Rel. 6.15.40 (2023-05-06)
The messages and texts referring to the export and import of CERTIFICATES have been changed to make them more understandable.
Fixed the wrong weekday culture information, and color background, in the LIGHT theme of the EXPIRATION DATE control (SIGN & PROTECT).
Fixed the wrong TYPE column culture information (SIGN & PROTECT - Signatures Grid).
Fixed toggling between DARK/LIGHT modes for Secure Keyboard keys.
Rel. 6.15.35 (2023-03-10)
Included a more friendly message for the limitation of Microsoft-365 modules in the FULL version.
Enhanced the scaling of custom logos regarding the QR-type signatures.
Changed the link to the LICENSE REQUEST page.
Minor changes on some messages and layout.
Minor upgrade in some Microsoft libraries following the last O.S. upgrades.
Rel. 6.15.21 (2022-06-21)
Releasing Microsoft security updates.
Some libraries were also updated.
Fixed a problem in delete a signed/protected PDF in the temp folder after the exception had raised.
Fixed exception in fast-editing files without any extension.
Rel. 6.15.10 (2022-06-19)
Updated several libraries and implemented security fixes.
Fixed a failure involving OBAKE OFFICE modules, when calling AES-NI-GCM algorithm.
Rel. 6.15 (2022-06-19)
New cryptographic algorithms were added and modernized, aiming to give users more options:
AES-NI-GCM : AES-256 algorithm implemented on INTEL CPUs (called AES-NI), with authenticity treatment per block based on Galois-Counter-Mode. Despite being restricted to newer computers (2010 onwards), it is the best performing AES version as it is hardware based.
ChaCha20-AEAD-Poly1305: it is a modern 256-bit key flow algorithm with MAC based on Poly-1305 and the use of an "AD" (Additional Data - makes the authentication more secure), being another great option to AES since it is immune to TIMING ATTACKS. This is the algorithm used by Google for your secure connections (see specs RFC-8439).
XSalsa-AEAD-Curve25519-Poly1305: based on the Salsa algorithm by Daniel J. Berstein, it is a modern 256-bit key algorithm that, in the "X" version, uses a 192-bit NOUNCE (instead of the normal 64-bit version), working on points of an elliptic curve (Curve25519) and with MAC based on Poly-1305. As seen, an extremely fast and secure flow algorithm, being a great option to AES, since it is immune to TIMING ATTACKS.
Fixed failure to access MS-OFFICE 365 modules, caused by a Windows modification in the form of passing parameters in program calls.