Commit Graph

14 Commits (bb1a749c49ef21906fbe35b9db7e435bf999a1e2)

Author SHA1 Message Date
Matthew Chen 36485c9461 Remove RedPhone code.
// FREEBIE
9 years ago
Michael Kirk 78515377b1 Censorship circumvention in Egypt and UAE
* domain fronting
* non-websocket message fetching
* alternate pinning policy for google hosted reflector server

// FREEBIE
9 years ago
Russ Shanahan 7125028159 Rename an OWSContactsManager method
From nameStringForPhoneIdentifier
  To displayNameForPhoneIdentifier

* Add nullability descriptions

* Fix the mock object to adhere to new nullability rules

// FREEBIE
9 years ago
Michael Kirk df756423f2 Ignore unknown group messages
otherwise when (e.g.) android adds a new group type they'll be shown as
empty bubbles.

// FREEBIE
9 years ago
Michael Kirk 1ba082356a Explicitly include newlines in numeric fingerprint
More straight forward than fudging / verifying different layout widths.

// FREEBIE
9 years ago
Michael Kirk 60a39f93c6 Remove phone numbers from scannable QR Code
Initially they were there to offer richer error messages when the wrong
code was scanned.

However, we found that people were posting them publicly,
misunderstanding the QR codes to be a kind of personal identifier.

For one, this isn't useful because the QR codes, like safety numbers,
are unique *per* conversation. So they aren't useful in a generic sense.
And secondly this is bad because the QR code contains both parties phone
numbers.

// FREEBIE
9 years ago
Michael Kirk 725153307e Add some nullability annotations (#62)
* fix compiler warnings about info message initializers

// FREEBIE
9 years ago
Michael Kirk 1ebb82f987 Contacts don't have safety numbers until they've exchanged keys.
// FREEBIE
9 years ago
Michael Kirk 40cdc7f224 disappearing messages
* Support for disappearing messages
* update inbox thread preview when receiving message

// FREEBIE
9 years ago
Michael Kirk c1ade86a8b New fingerprint format
In coordination with Desktop and Android, iOS will be using all-numeric
fingerprints, aka "Safety Numbers".

Furthermore, the concept of verifying one identity and then the other
has been removed. Instead we ask users to exchange a single number, or
scan a single QR code. These credentials are built by combining the
users identities.

// FREEBIE
9 years ago
Michael Kirk 9093be2b0d Device provisioning
// FREEBIE
9 years ago
Michael Kirk 664162fe24 Use SocketRocket pluggable policies (#15)
* Use SocketRocket pluggable policies

Pluggable policies are currently only in our fork, but pending upstream
PR: https://github.com/facebook/SocketRocket/pull/429

Also:
* rebased SocketRocket against latest upstream to incorporate bug fixes.
* adapt to new upstream API for error handling (vs previous exception throwing)
* renamed AFSecurityOWSPolicy -> OWSHTTPSecurityPolicy to differentiate
  it from OSWWebSocketSecurityPolicy
* Follow conventional singleton pattern with onceToken
* bump xcode version to play nice with SWIFT_NAME in SocketRocket

// FREEBIE
10 years ago
Michael Kirk 8058951b08 Adapt to updated SocketRocket pod refactorings. (#11)
While trying to pull in upstream changes to our fork of SocketRocket I
noticed we're publishing it/installing it from CocoaPods trunk, but
there's no need to do that.

Also, due to upstream refactoring, the actual included file has
changed.

// FREEBIE
10 years ago
Frederic Jacobs 5d91a5bd4f Init Commit 10 years ago