--- /dev/null
+SILC Toolkit 1.1.11
+===================
+
+This version introduces a new default private message key protection
+method by auto-negotiating private message key with SILC Key Exchange
+protocol over the SILC network, client-to-client. The SKE is executed
+by encapsulating it inside private messages. SKE results into secret
+shared key between the two clients and all private messages are protected
+with that key. This provides complete end-to-end protection for private
+messages even if the SILC servers cannot be trusted.
+
+SILC Client Library will auto-negotiate the key when private message is
+sent for the first time. Both users will be prompted to accept each others
+public keys and once accpeted they are cached and subsequent verification
+will be done automatically.
+
+SILC Client Library automatically detects, within seconds, if the remote
+client does not support the new method. User will receive a notification
+on screen telling that the private messages will be protected using normal
+session keys instead. This may happen also if an error occurs during
+the key exchange protocol.
+
+This feature is totally transparent and applications usually will not
+require any changes to get it working. For most cases it should work
+out of the box without modifications to the application.
+
+This version also adds a new say() client operation associated context
+which can be fetched from the SilcClientConnection entry. The associated
+context can be SilcClientEntry, SilcChannelEntry or SilcServerEntry and
+is meant to allow application to better target the say() operation.
+
+This version also enables higher security message payloads by including
+the Client Ids in the MAC computation. Support for this has existed for
+long time but it is now finally enabled.
+
+This version also adds various improvement to the SILC Key Exchange
+Library and the SILC Core Library.