Skip to content

Commit cb77d19

Browse files
author
teycir
committed
docs: Update CHANGELOG and SECURITY for v0.6.0
1 parent bf11379 commit cb77d19

2 files changed

Lines changed: 45 additions & 1 deletion

File tree

docs/CHANGELOG.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,38 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
77

88
## [Unreleased]
99

10+
## [0.6.0] - 2025-01-15
11+
12+
### Added
13+
- Memory protection for Key A (XOR obfuscation in browser memory)
14+
- Browser extension detection and warnings
15+
- Built-in warrant canary at /canary (auto-updating)
16+
- Security dashboard with real-time alerts
17+
- Self-hosting guide for infrastructure independence
18+
- Multi-party time attestation (external time source verification)
19+
- Comprehensive hardening documentation
20+
- Admin interface for canary management
21+
- GitHub Actions workflow for monthly canary reminders
22+
- Transparency report template
23+
24+
### Security
25+
- Key A now obfuscated in memory to prevent casual inspection
26+
- Extension detection warns users about potential memory access
27+
- Warrant canary provides legal coercion detection
28+
- Time attestation verifies Cloudflare time against external sources
29+
- Self-hosting option eliminates infrastructure trust dependency
30+
31+
### Documentation
32+
- HARDENING.md - Complete threat mitigation guide
33+
- SELF-HOSTING.md - Deployment instructions for own infrastructure
34+
- TRANSPARENCY-REPORT-TEMPLATE.md - Quarterly legal disclosure template
35+
- HARDENING-SETUP.md - Quick setup guide
36+
37+
### Threat Mitigation
38+
- Browser extension/malware memory access (detection + obfuscation)
39+
- Cloudflare infrastructure compromise (canary + time attestation)
40+
- Legal coercion (warrant canary + transparency)
41+
1042
## [0.5.1] - 2025-12-22
1143

1244
### Fixed

docs/SECURITY.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -189,14 +189,26 @@ Expected response time: 48 hours
189189
- [x] Key rotation procedures documented
190190
- [x] File upload limits (25MB Cloudflare Pages limit)
191191
- [x] Content-Security-Policy headers
192+
- [x] Memory protection for Key A (v0.6.0)
193+
- [x] Browser extension detection (v0.6.0)
194+
- [x] Warrant canary at /canary (v0.6.0)
195+
- [x] Security dashboard (v0.6.0)
192196
- [ ] Cloudflare WAF rules (optional)
193197
- [ ] IP reputation filtering (optional)
194198
- [ ] Geographic restrictions (optional)
195199
- [ ] Honeypot seals for enumeration detection (optional)
196200

197201
## Recent Security Enhancements
198202

199-
**v0.5.1 (2025-12-22):**
203+
**v0.6.0 (2025-01-15):**
204+
- Memory protection for Key A (XOR obfuscation)
205+
- Browser extension detection and warnings
206+
- Built-in warrant canary at /canary
207+
- Security dashboard with real-time alerts
208+
- Multi-party time attestation
209+
- Self-hosting guide for infrastructure independence
210+
211+
**v0.5.1 (2025-12-22):****
200212
- CRITICAL FIX: HKDF deterministic salt (all seals now decryptable)
201213
- Server-only pulse token generation (removed client UUID)
202214
- Time check ordering (prevents timing attacks)

0 commit comments

Comments
 (0)