You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
5.4 KiB
5.4 KiB
Changelog
All notable changes to this project will be documented in this file.
The format is based on Keep a Changelog.
2.1.8 [September 2024]
Added
- Added firmware downgrade protection [#4133]
Changed
- Require confirmation when installing non-full trust firmware image on empty device [#3709]
- Fix incorrect error message when installing firmware for different model. [#4081]
- [T3B1, T3T1] Added bootloader unlock mechanism to U5 models [#4133]
Fixed
- [T3B1] UI adjustments: fix icon on warning screen, replace empty logo with full during boot [#4140]
2.1.7 [July 2024]
Added
- [T3B1] Added support for T3B1.
2.1.6 [May 2024]
Added
- Added
unit_packaging
field toFeatures
. [#3711]
Changed
- [T3T1] Changed USB manufacturer string to "Trezor Company" and product string to "Trezor Safe 5" in the USB descriptor strings. [#3770]
2.1.5 [April 2024]
Added
- Added support for T3T1
- Added basic support for STM32U5 [#3370]
Changed
- Speed-up device boot [#3429]
2.1.4 [November 2023]
Added
- Minimize risk of losing seed when upgrading firmware. [#2794]
- Support interaction-less upgrade. [#2919]
2.1.3 [September 2023]
Changed
- Split builds of different parts to use simple util.s assembler, while FW+bootloader use interconnected ones. [#3205]
- No longer erases seed when firmware is corrupted but firmware header is correct and signed. Added firmware corrupted info to bootloader screen. [#3122]
- Correctly reinitialize Optiga SE when rebooting. [#3303]
2.1.2 [August 2023]
Internal only release for Model R prototypes.
Added
- Added support for STM32F429I-DISC1 board [#2989]
- Locked bootloader support: bootloader will disallow installation of unofficial firmware unless the Optiga pairing secret is erased.
- Support unlocking the bootloader via
UnlockBootloader
message.
Changed
- Show "empty lock" logo together with model name (replacing the "filled lock" logo for bootloader entirely). [#3222]
- When building a
PRODUCTION=0
bootloader, it will recognize the development signing keys instead of production ones.
Fixed
- Fixed gamma correction settings for Model T [#2955]
2.1.1 [June 2023]
Internal only release for Model R prototypes.
Added
- Added production public keys for T2B1. [#3048]
- Added UI for T2B1.
Fixed
- Fix installation of images smaller than 128kB. [#2941]
2.1.0 [April 2023]
Added
- Optimize touch controller communication [#262]
- Bootloader redesign [#1049]
- Add basic Trezor Model R hardware support [#2243]
- Jump and stay in bootloader from firmware through SVC call reverse trampoline. [#2284]
- Add RGB LED for Model R [#2300]
- Using hardware acceleration (dma2d) for rendering [#2414]
- Add stack overflow detection [#2427]
- Add model info to image and check when installing/running firmware [#2623]
- Introduced bootloader emulator. [#2879]
Changed
- Update logic of vendor header comparison. [#1599]
- CPU Frequency increased to 180 MHz [#2587]
- Fixed display blinking by increasing backlight PWM frequency [#2595]
Fixed
- Fixed retries counter when reading from USB [#2896]
Security
- Avoid accidental build with broken stack protector [#1642]
2.0.4 [May 2022]
Security
- Intentionally skipped this version due to fake devices
2.0.3 [March 2019]
Security
- Enable MPU
- Introduce delays to USB stack
2.0.2 [December 2018]
Added
- Support for a new display driver
2.0.1 [February 2018]
Added
- First public release [#262]: https://github.com/trezor/trezor-firmware/pull/262 [#1049]: https://github.com/trezor/trezor-firmware/pull/1049 [#1599]: https://github.com/trezor/trezor-firmware/pull/1599 [#1642]: https://github.com/trezor/trezor-firmware/pull/1642 [#2243]: https://github.com/trezor/trezor-firmware/pull/2243 [#2284]: https://github.com/trezor/trezor-firmware/pull/2284 [#2300]: https://github.com/trezor/trezor-firmware/pull/2300 [#2414]: https://github.com/trezor/trezor-firmware/pull/2414 [#2427]: https://github.com/trezor/trezor-firmware/pull/2427 [#2587]: https://github.com/trezor/trezor-firmware/pull/2587 [#2595]: https://github.com/trezor/trezor-firmware/pull/2595 [#2623]: https://github.com/trezor/trezor-firmware/pull/2623 [#2794]: https://github.com/trezor/trezor-firmware/pull/2794 [#2879]: https://github.com/trezor/trezor-firmware/pull/2879 [#2896]: https://github.com/trezor/trezor-firmware/pull/2896 [#2919]: https://github.com/trezor/trezor-firmware/pull/2919 [#2941]: https://github.com/trezor/trezor-firmware/pull/2941 [#2955]: https://github.com/trezor/trezor-firmware/pull/2955 [#2989]: https://github.com/trezor/trezor-firmware/pull/2989 [#3048]: https://github.com/trezor/trezor-firmware/pull/3048 [#3122]: https://github.com/trezor/trezor-firmware/pull/3122 [#3205]: https://github.com/trezor/trezor-firmware/pull/3205 [#3222]: https://github.com/trezor/trezor-firmware/pull/3222 [#3303]: https://github.com/trezor/trezor-firmware/pull/3303 [#3370]: https://github.com/trezor/trezor-firmware/pull/3370 [#3429]: https://github.com/trezor/trezor-firmware/pull/3429 [#3709]: https://github.com/trezor/trezor-firmware/pull/3709 [#3711]: https://github.com/trezor/trezor-firmware/pull/3711 [#3770]: https://github.com/trezor/trezor-firmware/pull/3770 [#4081]: https://github.com/trezor/trezor-firmware/pull/4081 [#4133]: https://github.com/trezor/trezor-firmware/pull/4133 [#4140]: https://github.com/trezor/trezor-firmware/pull/4140