Damus
Amber profile picture
Amber
@Amber

Amber is a nostr event signer for Android. It allows users to keep their nsec segregated in a single, dedicated app. The goal of Amber is to have your smartphone act as a NIP-46 signing device without any need for servers or additional hardware. "Private keys should be exposed to as few systems as possible as each system adds to the attack surface," as the rationale of said NIP states. In addition to native apps, Amber aims to support all current nostr web applications without requiring any extensions or web servers.

Relays (3)
  • wss://nos.lol/ – read & write
  • wss://nostr.mom/ – read & write
  • wss://relay.damus.io/ – read & write

Recent Notes

Amber profile picture
## Amber 4.1.3-pre1

- Profile relays: Remove relay.nostr.band. Add user.kindpag.es, profiles.nostr1.com, directory.yabu.me
- Better relay notification text
- Fix relay icon when more than 10 relays
- Hide icon and relay notification if not using apps that connect to relays
- Change backup screen from icon buttons to text buttons to avoid confusion when using ncryptsec
- Do not use strongBox when it's a mediatek device, it's breaking all the time
- Use AlarmManager to start the service to see if it fixes the crash on graphene os restart app button press
- Remove relay.nsec.app from defaults (it's not working properly sometimes)
- Close profile subscriptions once receiving EOSE from relays
- Fix icon size and themed icon

Download it with [Zapstore](https://zapstore.dev/apps/naddr1qvzqqqr7pvpzqateqake4lc2fn77lflzq30jfpk8uhvtccalc66989er8cdmljceqqdkxmmd9enhyet9deshyaphvvejumn0wd68yumfvahx2usx8zmj2), [Obtainium](https://github.com/ImranR98/Obtainium), [f-droid](https://f-droid.org/packages/com.greenart7c3.nostrsigner) or download it directly in the [releases page](https://github.com/greenart7c3/Amber/releases/tag/v4.1.3-pre1)

If you like my work consider making a [donation](https://greenart7c3.com)

## Verifying the release

In order to verify the release, you'll need to have `gpg` or `gpg2` installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:

``` bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
```

Once you have his PGP key you can verify the release (assuming `manifest-v4.1.3-pre1.txt` and `manifest-v4.1.3-pre1.txt.sig` are in the current directory) with:

``` bash
gpg --verify manifest-v4.1.3-pre1.txt.sig manifest-v4.1.3-pre1.txt
```

You should see the following if the verification was successful:

``` bash
gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03
gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D
gpg: Good signature from "greenart7c3 <[email protected]>"
```

That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:

``` bash
cat manifest-v4.1.3-pre1.txt
```

One can use the `shasum -a 256 <file name here>` tool in order to re-compute the `sha256` hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
5❤️2💜2🔥1🤙1🧡1
Amber profile picture
## Amber 4.1.2

- Fix some missing Relay trusted score in some screens
- Move some components to it's own file
- Use full uuid for bunker secrets
- Remove some unused dependencies
- Migrate from LiveData to Flow in the account Model
- Upgrade to gradle plugin 9
- Fix json parsing error for encrypt/decrypt requests when they are not nostr events
- Fix a crash when receiving a auth event without relay tags

Download it with [zapstore.dev](https://zapstore.dev/download), [Obtainium](https://github.com/ImranR98/Obtainium), [f-droid](https://f-droid.org/packages/com.greenart7c3.nostrsigner) or download it directly in the [releases page](https://github.com/greenart7c3/Amber/releases/tag/v4.1.2)

If you like my work consider making a [donation](https://greenart7c3.com)

## Verifying the release

In order to verify the release, you'll need to have `gpg` or `gpg2` installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:

``` bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
```

Once you have his PGP key you can verify the release (assuming `manifest-v4.1.2.txt` and `manifest-v4.1.2.txt.sig` are in the current directory) with:

``` bash
gpg --verify manifest-v4.1.2.txt.sig manifest-v4.1.2.txt
```

You should see the following if the verification was successful:

``` bash
gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03
gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D
gpg: Good signature from "greenart7c3 <[email protected]>"
```

That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:

``` bash
cat manifest-v4.1.2.txt
```

One can use the `shasum -a 256 <file name here>` tool in order to re-compute the `sha256` hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
11🤙1
Amber profile picture
## Amber 4.1.2-pre1

- Fix some missing Relay trusted score in some screens
- Move some components to it's own file
- Use full uuid for bunker secrets
- Remove some unused dependencies
- Migrate from LiveData to Flow in the account Model
- Upgrade to gradle plugin 9
- Fix json parsing error for encrypt/decrypt requests when they are not nostr events

Download it with [zapstore.dev](https://zapstore.dev/download), [Obtainium](https://github.com/ImranR98/Obtainium), [f-droid](https://f-droid.org/packages/com.greenart7c3.nostrsigner) or download it directly in the [releases page](https://github.com/greenart7c3/Amber/releases/tag/v4.1.2-pre1)

If you like my work consider making a [donation](https://greenart7c3.com)

## Verifying the release

In order to verify the release, you'll need to have `gpg` or `gpg2` installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:

``` bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
```

Once you have his PGP key you can verify the release (assuming `manifest-v4.1.2-pre1.txt` and `manifest-v4.1.2-pre1.txt.sig` are in the current directory) with:

``` bash
gpg --verify manifest-v4.1.2-pre1.txt.sig manifest-v4.1.2-pre1.txt
```

You should see the following if the verification was successful:

``` bash
gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03
gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D
gpg: Good signature from "greenart7c3 <[email protected]>"
```

That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:

``` bash
cat manifest-v4.1.2-pre1.txt
```

One can use the `shasum -a 256 <file name here>` tool in order to re-compute the `sha256` hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
1❤️1🫂1
Amber profile picture
## Amber 4.1.1

- New ui for login, events and permissions screen
- Refactor relay counters to use the updated method from quartz library
- Fix relay connection not closing when trying to add a unsupported relay
- Expose datastore errors
- Fix connection not being deleted when it fails when using bunker
- Add a loading indicator when login in
- Let the app crash when it fails to read the intent
- Use application wide scope for the datastore
- Remove migration code from old encrypted shared preferences
- Throw a error if could not find the private keys inside the keystore
- Cache keystore and signer (some 'old' devices are taking 20+ seconds to load the keystore)
- Relay trusted score by @Geektoshi
- Verify if account exists before trying to load the keys
- Support for `switch_relays` method

Download it with [zapstore.dev](https://zapstore.dev/download), [Obtainium](https://github.com/ImranR98/Obtainium), [f-droid](https://f-droid.org/packages/com.greenart7c3.nostrsigner) or download it directly in the [releases page](https://github.com/greenart7c3/Amber/releases/tag/v4.1.1)

If you like my work consider making a [donation](https://greenart7c3.com)

## Verifying the release

In order to verify the release, you'll need to have `gpg` or `gpg2` installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:

``` bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
```

Once you have his PGP key you can verify the release (assuming `manifest-v4.1.1.txt` and `manifest-v4.1.1.txt.sig` are in the current directory) with:

``` bash
gpg --verify manifest-v4.1.1.txt.sig manifest-v4.1.1.txt
```

You should see the following if the verification was successful:

``` bash
gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03
gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D
gpg: Good signature from "greenart7c3 <[email protected]>"
```

That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:

``` bash
cat manifest-v4.1.1.txt
```

One can use the `shasum -a 256 <file name here>` tool in order to re-compute the `sha256` hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
9❤️7👍4❤️2🔥2💜1
Amber profile picture
## Amber 4.1.0

- New ui for login, events and permissions screen
- Refactor relay counters to use the updated method from quartz library
- Fix relay connection not closing when trying to add a unsupported relay
- Expose datastore errors
- Fix connection not being deleted when it fails when using bunker
- Add a loading indicator when login in
- Let the app crash when it fails to read the intent
- Use application wide scope for the datastore
- Remove migration code from old encrypted shared preferences
- Throw a error if could not find the private keys inside the keystore
- Cache keystore and signer (some 'old' devices are taking 20+ seconds to load the keystore)

Download it with [zapstore.dev](https://zapstore.dev/download), [Obtainium](https://github.com/ImranR98/Obtainium), [f-droid](https://f-droid.org/packages/com.greenart7c3.nostrsigner) or download it directly in the [releases page](https://github.com/greenart7c3/Amber/releases/tag/v4.1.0)

If you like my work consider making a [donation](https://greenart7c3.com)

## Verifying the release

In order to verify the release, you'll need to have `gpg` or `gpg2` installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:

``` bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
```

Once you have his PGP key you can verify the release (assuming `manifest-v4.1.0.txt` and `manifest-v4.1.0.txt.sig` are in the current directory) with:

``` bash
gpg --verify manifest-v4.1.0.txt.sig manifest-v4.1.0.txt
```

You should see the following if the verification was successful:

``` bash
gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03
gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D
gpg: Good signature from "greenart7c3 <[email protected]>"
```

That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:

``` bash
cat manifest-v4.1.0.txt
```

One can use the `shasum -a 256 <file name here>` tool in order to re-compute the `sha256` hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
4❤️1💜3🤘🏽1🧡1
elnardosa · 5w
Obrigado por informar. Atualizei.
Amber profile picture
## Amber 4.1.0-pre3

- New ui for login, events and permissions screen
- Refactor relay counters to use the updated method from quartz library
- Fix relay connection not closing when trying to add a unsupported relay
- Expose datastore errors
- Fix connection not being deleted when it fails when using bunker
- Add a loading indicator when login in
- Let the app crash when it fails to read the intent
- Use application wide scope for the datastore
- Remove migration code from old encrypted shared preferences
- Throw a error if could not find the private keys inside the keystore

Download it with [zapstore.dev](https://zapstore.dev/download), [Obtainium](https://github.com/ImranR98/Obtainium), [f-droid](https://f-droid.org/packages/com.greenart7c3.nostrsigner) or download it directly in the [releases page](https://github.com/greenart7c3/Amber/releases/tag/v4.1.0-pre3)

If you like my work consider making a [donation](https://greenart7c3.com)

## Verifying the release

In order to verify the release, you'll need to have `gpg` or `gpg2` installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:

``` bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
```

Once you have his PGP key you can verify the release (assuming `manifest-v4.1.0-pre3.txt` and `manifest-v4.1.0-pre3.txt.sig` are in the current directory) with:

``` bash
gpg --verify manifest-v4.1.0-pre3.txt.sig manifest-v4.1.0-pre3.txt
```

You should see the following if the verification was successful:

``` bash
gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03
gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D
gpg: Good signature from "greenart7c3 <[email protected]>"
```

That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:

``` bash
cat manifest-v4.1.0-pre3.txt
```

One can use the `shasum -a 256 <file name here>` tool in order to re-compute the `sha256` hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
35❤️2❤️2👀1👍1💜1
elnardosa · 5w
Você mudou o certificado que usa para assinar essas versões pré?
Amber profile picture
## Amber 4.1.0-pre1

- New ui for login, events and permissions screen
- Refactor relay counters to use the updated method from quartz library
- Fix relay connection not closing when trying to add a unsupported relay

Download it with [zapstore.dev](https://zapstore.dev/download), [Obtainium](https://github.com/ImranR98/Obtainium), [f-droid](https://f-droid.org/packages/com.greenart7c3.nostrsigner) or download it directly in the [releases page](https://github.com/greenart7c3/Amber/releases/tag/v4.1.0-pre1)

If you like my work consider making a [donation](https://greenart7c3.com)

## Verifying the release

In order to verify the release, you'll need to have `gpg` or `gpg2` installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:

``` bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
```

Once you have his PGP key you can verify the release (assuming `manifest-v4.1.0-pre1.txt` and `manifest-v4.1.0-pre1.txt.sig` are in the current directory) with:

``` bash
gpg --verify manifest-v4.1.0-pre1.txt.sig manifest-v4.1.0-pre1.txt
```

You should see the following if the verification was successful:

``` bash
gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03
gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D
gpg: Good signature from "greenart7c3 <[email protected]>"
```

That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:

``` bash
cat manifest-v4.1.0-pre1.txt
```

One can use the `shasum -a 256 <file name here>` tool in order to re-compute the `sha256` hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
❤️2👀1👍1💜1
Amber profile picture
## Amber 4.0.7

- Fix some crashes
- Separate relay and service notifications
- Save screen state in the login screen

Download it with [zapstore.dev](https://zapstore.dev/download), [Obtainium](https://github.com/ImranR98/Obtainium), [f-droid](https://f-droid.org/packages/com.greenart7c3.nostrsigner) or download it directly in the [releases page](https://github.com/greenart7c3/Amber/releases/tag/v4.0.7)

If you like my work consider making a [donation](https://greenart7c3.com)

## Verifying the release

In order to verify the release, you'll need to have `gpg` or `gpg2` installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:

``` bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
```

Once you have his PGP key you can verify the release (assuming `manifest-v4.0.7.txt` and `manifest-v4.0.7.txt.sig` are in the current directory) with:

``` bash
gpg --verify manifest-v4.0.7.txt.sig manifest-v4.0.7.txt
```

You should see the following if the verification was successful:

``` bash
gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03
gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D
gpg: Good signature from "greenart7c3 <[email protected]>"
```

That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:

``` bash
cat manifest-v4.0.7.txt
```

One can use the `shasum -a 256 <file name here>` tool in order to re-compute the `sha256` hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
210❤️5👍3🚀2🧡2❤️1💜1
OK3E · 7w
I appreciate the work that has been done here. And I would like compatibility with NIP77 to be included. I think it would be amazing to be able to share my entire Nostr interaction history with a relay in a "simple" synchronization.
Satty · 6w
Hello amber, I cannot sign in on websites like Shakespeare etc. using the amber signer. I generate a new bunker in Amber, then paste the bunker into the application but I never receive an event to sign, and I cannot sign in on the webpage
Amber profile picture
## Amber 4.0.6

- Remove `get_public_key` from content provider
- Handle parsing errors when trying to decrypt content to show the content for the user
- Fix a crash on edit app the permission screen
- Add a cache to the signer to improve performance
- Use finishAndRemoveTask instead of finish
- Fix screen recomposition
- Fix crash when reading a invalid nostrconnect URI
- Retry sending connect event on failure when adding a relay

Download it with [zapstore.dev](https://zapstore.dev/download), [Obtainium](https://github.com/ImranR98/Obtainium), [f-droid](https://f-droid.org/packages/com.greenart7c3.nostrsigner) or download it directly in the [releases page](https://github.com/greenart7c3/Amber/releases/tag/v4.0.6)

If you like my work consider making a [donation](https://greenart7c3.com)

## Verifying the release

In order to verify the release, you'll need to have `gpg` or `gpg2` installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:

``` bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
```

Once you have his PGP key you can verify the release (assuming `manifest-v4.0.6.txt` and `manifest-v4.0.6.txt.sig` are in the current directory) with:

``` bash
gpg --verify manifest-v4.0.6.txt.sig manifest-v4.0.6.txt
```

You should see the following if the verification was successful:

``` bash
gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03
gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D
gpg: Good signature from "greenart7c3 <[email protected]>"
```

That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:

``` bash
cat manifest-v4.0.6.txt
```

One can use the `shasum -a 256 <file name here>` tool in order to re-compute the `sha256` hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
4❤️3❤️2🤙2👍1
m4d4m · 10w
Tested with notification off. Untill Amber is back from background, no action is usually confirmed. Amber is quite often missing from the list of 'Active apps'. Don't know why, so many remain there all the time. So far not working good with this setting. Can the relay connected notification info li...
Amber profile picture
## Amber 4.0.5

- Implemented pagination in the application, logs and activities screen
- Fix database size calculation inside the settings screen
- Optimize `getSavedRelays` to query unique relay lists directly
- Remove application name pre-loading in `IncomingRequestScreen`
- Use direct `DELETE` queries for clearing old logs and history instead of iterative deletion

Download it with [zapstore.dev](https://zapstore.dev/download), [Obtainium](https://github.com/ImranR98/Obtainium), [f-droid](https://f-droid.org/packages/com.greenart7c3.nostrsigner) or download it directly in the [releases page](https://github.com/greenart7c3/Amber/releases/tag/v4.0.5)

If you like my work consider making a [donation](https://greenart7c3.com)

## Verifying the release

In order to verify the release, you'll need to have `gpg` or `gpg2` installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:

``` bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
```

Once you have his PGP key you can verify the release (assuming `manifest-v4.0.5.txt` and `manifest-v4.0.5.txt.sig` are in the current directory) with:

``` bash
gpg --verify manifest-v4.0.5.txt.sig manifest-v4.0.5.txt
```

You should see the following if the verification was successful:

``` bash
gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03
gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D
gpg: Good signature from "greenart7c3 <[email protected]>"
```

That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:

``` bash
cat manifest-v4.0.5.txt
```

One can use the `shasum -a 256 <file name here>` tool in order to re-compute the `sha256` hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
❤️3❤️1💜1