The interactive file manager requires Javascript. Please enable it or use sftp or scp.
You may still browse the files here.

Download Latest Version eMark-1.1.2.jar (14.5 MB)
Email in envelope

Get an email when there's a new version of eMark

Home
Name Modified Size InfoDownloads / Week
V1.1.2 2025-10-25
V1.1.1 2025-10-20
V1.1.0 2025-10-13
V1.0.1 2025-10-02
V1.0.0 2025-09-07
README.md 2025-10-24 29.8 kB
Totals: 6 Items   29.8 kB 34
# πŸ” eMark | Professional Adobe Reader DC Alternative for PDF Signing [![License: AGPL v3](https://img.shields.io/badge/License-AGPL%20v3-blue.svg)](https://www.gnu.org/licenses/agpl-3.0) [![Java](https://img.shields.io/badge/Java-8-007396?logo=openjdk&logoColor=white)](https://www.oracle.com/java/) [![Platform](https://img.shields.io/badge/Platform-Windows%20%7C%20Linux%20%7C%20macOS-brightgreen)](https://github.com/devcodemuni/eMark/releases) [![Version](https://img.shields.io/github/v/release/devcodemuni/eMark?label=Version)](https://github.com/devcodemuni/eMark/releases/latest) [![Downloads](https://img.shields.io/github/downloads/devcodemuni/eMark/total?color=success&label=Downloads)](https://github.com/devcodemuni/eMark/releases) [![Stars](https://img.shields.io/github/stars/devcodemuni/eMark?style=social)](https://github.com/devcodemuni/eMark/stargazers) ### 🌐 **[Visit Official Website](https://devcodemuni.github.io/eMark/)** β€’ **[Installation Guide](https://devcodemuni.github.io/eMark/installation.html)** β€’ **[Download Now](https://github.com/devcodemuni/eMark/releases/latest)** eMark - Professional PDF Signing Software **Free β€’ Open Source β€’ Cross-Platform β€’ Enterprise-Grade Security**

πŸ“– Table of Contents


🎯 Overview

eMark is a professional, free, and open-source PDF signing and verification application designed as a powerful Adobe Reader DC alternative. It enables individuals, businesses, and government organizations to securely sign, verify, timestamp, and protect PDF documents with enterprise-grade security.

🌟 Why eMark?

  • βœ… Adobe Reader DC Compatible - Signatures verified by Adobe products
  • βœ… 100% Free & Open Source - No hidden costs, licenses, or subscriptions
  • βœ… Multi-Platform - Windows, Linux, macOS with consistent UI
  • βœ… Multi-Certificate Support - USB tokens, HSM, smart cards, PKCS#11/12
  • βœ… Enterprise Security - RFC 3161, LTV, PAdES compliant
  • βœ… Privacy-First - 100% offline, no cloud upload, zero tracking
  • βœ… Professional Interface - Adobe Reader-like experience with modern dark theme

🎯 Perfect For

Sector Use Case
πŸ›οΈ Government Tender submissions, official documents, DSC signing
βš–οΈ Legal Contracts, agreements, court documents, legally binding signatures
πŸ’Ό Business Invoices, purchase orders, NDAs, contracts, vendor agreements
πŸ₯ Healthcare Medical records, prescriptions
πŸŽ“ Education Certificates, transcripts, academic papers, research documents

✨ Key Features

πŸ” PDF Signature Verification

Signature Verification

  • Comprehensive Verification - Verify digital signatures with detailed validation status
  • Certificate Chain Validation - Complete trust chain verification with CA certificate checks
  • Signature Integrity Checks - Detect document modifications after signing
  • Visual Status Indicators - Color-coded overlays (🟒 Valid, 🟑 Untrusted, πŸ”΄ Invalid)
  • Adobe Reader Compatible - Verify eMark-signed PDFs in Adobe Reader DC/Acrobat
  • Automatic Detection - Instantly detect all signatures when opening PDFs
  • Detailed Certificate Info - View issuer, subject, validity period, key usage, extensions
  • Timestamp Verification - Validate RFC 3161 timestamps for long-term validity

πŸ–‹οΈ PDF Digital Signing (Existing Fields or New Fields) **

PDF Signing Interface

  • Drag-and-Drop Placement - Intuitive signature positioning anywhere on the page
  • Automatic Field Detection - Recognize and sign existing PDF signature fields
  • Live Preview - See signature appearance before applying
  • Customizable Appearance - Add text, reason, location, date, custom images
  • Multiple Signatures - Apply multiple signatures to single document
  • Batch Signing - Sign multiple documents efficiently
  • Signature Reason & Location - Add metadata for legal compliance
  • Page Selection - Sign specific pages or all pages

πŸ” Multi-Certificate Support

Certificate Selection

Certificate Type Support Description
USB Tokens βœ… Full eToken, SafeNet, Gemalto, Feitian, and more
HSM (PKCS#11) βœ… Full Hardware Security Modules with PKCS#11 interface
Smart Cards βœ… Full Contact and contactless smart cards
PKCS#12/PFX βœ… Full File-based certificates with private key
Windows Certificate Store βœ… Full Native Windows certificate integration
JKS Keystore βœ… Full Java keystore files

🌐 Cross-Platform Excellence

  • Windows - Native .exe installer, full Windows Certificate Store integration
  • Linux - .deb package for Debian/Ubuntu, portable JAR for other distros
  • macOS - Universal JAR with native look and feel
  • Consistent UI - Same features and interface across all platforms
  • No Platform Lock-in - Switch between OS without relearning

🎨 Modern User Interface

Modern UI

  • Dark Theme - Elegant FlatMacDarkLaf theme for reduced eye strain
  • Collapsible Panels - Signature properties panel for streamlined workflow
  • Interactive Overlays - Visual signature indicators with click-to-verify
  • Floating Action Button - Quick access to signing functions
  • Responsive Design - Adapts to different screen sizes and resolutions
  • Intuitive Navigation - Adobe Reader-familiar layout for easy adoption

πŸ›‘οΈ Enterprise-Grade Security

  • RFC 3161 Timestamping - Trusted timestamp authority (TSA) support
  • Long-Term Validation (LTV) - Embed validation data for future verification
  • Certificate Revocation - OCSP and CRL checking
  • Password Protection - Sign password-protected PDFs
  • Trust Management - Import/manage trusted CA certificates
  • RSA - Support for modern cryptographic key types

πŸ”’ Security & Compliance

πŸ›‘οΈ Cryptographic Security

Digital Signature Standards

  • βœ… ISO 32000 (PDF specification) compliant
  • βœ… CAdES (CMS Advanced Electronic Signatures) compatible
  • βœ… PKCS#7 signature format support
  • βœ… PKCS#11 v2.40 for hardware security devices
  • βœ… RFC 3161 timestamping protocol
  • βœ… RFC 5280 X.509 certificate validation
  • βœ… RFC 6960 OCSP (Online Certificate Status Protocol)

πŸ›οΈ Compliance & Standards

Standard/Regulation Compliance Details
DSC βœ… Full Support Digital Signature Certificate (India)

πŸ” Certificate Validation

Certificate Validation Process:
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ 1. Certificate Chain Verification   β”‚ βœ… Root CA β†’ Intermediate CA β†’ End Entity
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ 2. Certificate Validity Period      β”‚ βœ… Not Before ≀ Now ≀ Not After
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ 3. Certificate Revocation Check     β”‚ βœ… OCSP and/or CRL validation
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ 4. Key Usage Verification           β”‚ βœ… Digital Signature, Non-Repudiation
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ 5. Trust Anchor Validation          β”‚ βœ… Trusted Root CA Store
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ 6. Signature Integrity Check        β”‚ βœ… Hash comparison, no tampering
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ”’ Hardware Security Device Support

Tested USB Tokens & HSMs

  • βœ… HYP2003 - HyperPKI 2003
  • βœ… ProxKey Token - Watchdata Proxkey
  • βœ… Longmai - mToken CryptoID
  • βœ… SOFT HSM - soft HSM

PKCS#11 Library Configuration

eMark automatically detects common PKCS#11 libraries or allows manual configuration: - Windows: Using window keystore - Linux/macos: wd_proxkey, mToken

πŸ” Timestamp Authority (TSA) Support

Why Timestamping Matters: - βœ… Proves signature was created at a specific time - βœ… Extends signature validity beyond certificate expiration - βœ… Legal requirement in many jurisdictions - βœ… Prevents backdating attacks

Supported TSA Protocols: - RFC 3161 compliant timestamp servers - HTTP and HTTPS timestamp requests - Proxy server support for corporate environments

Popular Free TSA Servers: - DigiCert TSA: http://timestamp.digicert.com - Sectigo TSA: http://timestamp.sectigo.com


πŸš€ Quick Start

πŸ“‹ Prerequisites

# Java 8 (JRE or JDK) is REQUIRED
# Check your Java version:
java -version

# Expected output:
# java version "1.8.0_xxx"
# Java(TM) SE Runtime Environment (build 1.8.0_xxx-bxx)
⚠️ Important:
  • Java 8 (1.8.x) required: Fully tested on Java 8 for optimal performance.
  • Compatible with JDK & JRE: eMark runs smoothly on both Java Development Kit (JDK) and Java Runtime Environment (JRE) 8.
  • Not supported: Java 7 or versions above Java 8 (Java 9+).

πŸ“₯ Quick Installation

Windows

# Download and run the .exe installer
1. Download: eMark-Setup-v1.1.0.exe
2. Double-click to install
3. Launch eMark from Start Menu

Linux (Debian/Ubuntu)

# Download and install .deb package
wget https://github.com/devcodemuni/eMark/releases/latest/download/eMark-V1.1.2.deb
sudo dpkg -i eMark-V1.1.2.deb

# Or use JAR file
java -jar eMark-V1.1.2.jar

macOS

# Use universal JAR file
java -jar eMark-V1.1.2.jar

πŸ“₯ Installation

Download Latest Release

Available Packages: - πŸͺŸ Windows - .exe installer (64-bit) - 🐧 Linux - .deb package (Debian/Ubuntu) - πŸ“¦ Universal - .jar file (all platforms)

System Requirements

Component Minimum Recommended
OS Windows 7 / Ubuntu 18.04 / macOS 10.13 Windows 10/11 / Ubuntu 22.04 / macOS 12+
Java Java 8 (1.8.0) Java 8 (latest update)
RAM 512 MB 1 GB+
Disk Space 100 MB 200 MB+
Screen 1024x768 1920x1080+
Hardware Optional USB token/smart card reader USB token with PKCS#11 support

πŸ” Certificate & Signing Methods

πŸ”‘ 1. USB Token / HSM (PKCS#11)

Best For: Maximum security, government/legal documents, corporate environments

Advantages: - βœ… Private key never leaves hardware device - βœ… PIN-protected access - βœ… Tamper-resistant hardware - βœ… Meets highest security standards - βœ… Multi-certificate storage

Setup: 1. Install token driver from manufacturer 2. Configure PKCS#11 library path in eMark 3. Insert token and enter PIN 4. Select certificate and sign

πŸ“„ 2. PKCS#12/PFX Certificate File

Best For: Personal use, testing, development

Advantages: - βœ… Easy to use and portable - βœ… No hardware required - βœ… Password-protected - βœ… Works on any platform

Setup: 1. Obtain .pfx or .p12 certificate file 2. In eMark: File β†’ Import PKCS#12 3. Enter password when prompted 4. Certificate ready for signing

Security Note: - ⚠️ Private key stored in software (less secure than hardware) - ⚠️ Protect .pfx file with strong password - ⚠️ Store on encrypted drive

πŸͺŸ 3. Windows Certificate Store

Best For: Windows enterprise environments, Active Directory

Advantages: - βœ… Native Windows integration - βœ… Centralized management - βœ… Single sign-on (SSO) compatible - βœ… Group Policy deployment

Certificate Locations: - certmgr.msc - User certificates - Personal β†’ Certificates


πŸ›‘οΈ Privacy & Data Protection

πŸ”’ Zero Data Collection

eMark is designed with privacy-first principles:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  What eMark NEVER Does:                     β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  ❌ Upload PDFs to cloud servers            β”‚
β”‚  ❌ Send data to external servers           β”‚
β”‚  ❌ Track user behavior or analytics        β”‚
β”‚  ❌ Store signing history externally        β”‚
β”‚  ❌ Collect personal information            β”‚
β”‚  ❌ Share certificates or keys              β”‚
β”‚  ❌ Phone home or check licenses            β”‚
β”‚  ❌ Display advertisements                  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

🌐 100% Offline Operation

  • βœ… All PDF processing happens locally on your computer
  • βœ… Private keys never leave hardware security devices
  • βœ… No internet connection required (except for optional OCSP/timestamp)
  • βœ… Complete air-gap deployment supported
  • βœ… Works in secure/classified environments

πŸ” GDPR Compliance

As an open-source, offline application: - βœ… No personal data collection - Nothing to report or delete - βœ… Data controller independence - You control all data - βœ… No third-party sharing - Data never leaves your premises - βœ… Transparent processing - Open-source code auditable - βœ… Right to audit - Full source code available

πŸ”’ Secure by Design

Memory Security: - Sensitive data (PINs, passwords) cleared from memory after use - No sensitive data written to disk/swap - Secure random number generation

Certificate Security: - Private keys accessed only through secure APIs - PIN/password never stored permanently - Hardware token PINs never exposed to application

File Security: - Original PDFs never modified (new file created) - Temporary files securely deleted - No backup copies in hidden folders


πŸ”§ Technology Stack

Component Technology Version Purpose
Language Java 8 (1.8) Core application
UI Framework Swing Built-in User interface
Look & Feel FlatLaf 3.x Modern dark theme
PDF Library Apache PDFBox 2.x PDF rendering/viewing
Signing Engine iText 5 5.5.x PDF digital signatures
Crypto Provider Bouncy Castle 1.70+ Cryptographic operations
PKCS#11 Sun PKCS#11 Built-in Hardware token support
Build Tool Maven 3.x Project management

πŸ“¦ Dependencies

<!-- Core Dependencies -->
<dependency>
    <groupId>com.itextpdf</groupId>
    <artifactId>itextpdf</artifactId>
    <version>5.5.13.3</version>
</dependency>

<dependency>
    <groupId>org.bouncycastle</groupId>
    <artifactId>bcprov-jdk15on</artifactId>
    <version>1.70</version>
</dependency>

<dependency>
    <groupId>org.apache.pdfbox</groupId>
    <artifactId>pdfbox</artifactId>
    <version>2.0.27</version>
</dependency>

<dependency>
    <groupId>com.formdev</groupId>
    <artifactId>flatlaf</artifactId>
    <version>3.2.5</version>
</dependency>

πŸ†š Comparison with Adobe Products

πŸ“Š Feature Comparison

Feature eMark Adobe Acrobat DC
Price 🟒 Free Forever πŸ”΄ Subscription required
Open Source 🟒 Yes (AGPL 3.0) πŸ”΄ Proprietary
PDF Signing 🟒 Full Support 🟒 Full Support
Signature Verification 🟒 Yes 🟒 Yes
USB Token/HSM (PKCS#11) 🟒 Yes 🟒 Yes
Windows Certificate Store 🟒 Yes 🟒 Yes
PKCS#12/PFX 🟒 Yes πŸ”΄ No
Cross-Platform 🟒 Windows/Linux/macOS 🟑 Windows/macOS
Timestamp (RFC 3161) 🟒 Yes 🟒 Yes
LTV Support 🟒 Yes 🟒 Yes
Batch Signing 🟒 Yes 🟒 Yes
Custom Appearance 🟒 Yes 🟒 Yes
Offline Operation 🟒 100% Offline 🟑 Requires Login
Privacy 🟒 Zero Tracking πŸ”΄ Analytics/Telemetry
Source Code 🟒 Available πŸ”΄ Closed Source

πŸ”§ Troubleshooting

🚨 Common Issues & Solutions

❌ Java Version Error

Error: Unsupported Java version

Solution:
1. Check Java version: java -version
2. Expected: java version "1.8.0_xxx"
3. Download Java 8: https://www.oracle.com/java/technologies/javase/javase8-archive-downloads.html

❌ Certificate Not Detected

Problem: USB token certificate not appearing

Solution:
1. Install token driver from manufacturer
2. Verify token is inserted properly
3. Check PKCS#11 library path in Settings
4. Restart eMark after configuring
5. Test with: certutil -scinfo (Windows) or pkcs11-tool -L (Linux)

❌ PDF Loading Issues

Problem: PDF fails to open or displays incorrectly

Solution:
1. Verify PDF is not corrupted (open in another viewer)
2. Check if PDF is password-protected (enter password)
3. Ensure file permissions allow reading
4. Try re-saving PDF with "Save As" in another viewer
5. Check PDF version (PDF 1.4-2.0 supported)

❌ Signature Verification Failed

Problem: Signature shows as invalid or untrusted

Solution:
1. Import CA certificate to trust store (Settings β†’ Trust Certificates)
2. Check internet connection for OCSP/CRL validation
3. Verify certificate hasn't expired
4. Ensure certificate chain is complete
5. Add timestamp server certificate to trust store

❌ PIN Entry Issues

Problem: Token PIN not accepted

Solution:
1. Verify correct PIN with token manufacturer app
2. Check if token is locked (too many wrong attempts)
3. Try unplugging and replugging token
4. Update token drivers
5. Test token with manufacturer's software first

🀝 Contributing

We welcome contributions from the community! πŸŽ‰

🌟 Ways to Contribute

  • πŸ› Report Bugs - Help us improve by reporting issues
  • πŸ’‘ Suggest Features - Share your ideas for new features
  • πŸ“ Improve Documentation - Help others understand eMark
  • πŸ”§ Submit Code - Fix bugs or implement features
  • 🌐 Translations - Help make eMark multilingual
  • ⭐ Star the Project - Show your support

πŸ“‹ Before Contributing

  1. Read our Contributing Guidelines
  2. Check existing issues
  3. Fork the repository
  4. Create a feature branch
  5. Make your changes
  6. Submit a pull request

πŸ› Reporting Bugs

When reporting bugs, please include: - Operating system and version - Java version (java -version) - eMark version - Steps to reproduce - Expected vs actual behavior - Error logs or screenshots

πŸ’‘ Feature Requests

For feature requests, please describe: - The problem you're trying to solve - Your proposed solution - Why this would be valuable to users - Any alternative solutions considered


πŸ”’ Security

πŸ›‘οΈ Security Policy

We take security seriously. If you discover a security vulnerability:

⚠️ DO NOT open a public GitHub issue.

Instead: 1. Email: [Create a security advisory on GitHub] 2. Provide detailed information about the vulnerability 3. Include steps to reproduce (if applicable) 4. Allow reasonable time for a fix before public disclosure

πŸ” Security Best Practices

When using eMark: - βœ… Always use strong PINs/passwords for tokens and certificates - βœ… Keep USB tokens physically secure - βœ… Regularly update Java to latest Java 8 version - βœ… Only download eMark from official GitHub releases - βœ… Verify signature of downloaded files (if provided) - βœ… Use hardware tokens for sensitive documents - βœ… Enable timestamping for long-term validity - βœ… Regularly backup certificates and private keys (encrypted)


πŸ“„ License

This project is licensed under the GNU Affero General Public License v3.0 (AGPL-3.0).

πŸ“œ License Summary

eMark - Professional PDF Signing Software
Copyright (C) 2025 Codemuni

This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published
by the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.

βœ… What This Means (AGPL 3.0)

Under the AGPL 3.0 license:

You CAN:

  • βœ… Run eMark for any purpose, including personal, organizational, or commercial use
  • βœ… Modify the source code for your own use
  • βœ… Share or distribute eMark (modified or unmodified) as long as the source code is made available under the AGPL
  • βœ… Deploy eMark over a network (e.g., SaaS) if you provide access to the source code

You CANNOT:

  • ❌ Distribute it under a proprietary license
  • ❌ Remove copyright or license notices
  • ❌ Keep modifications private if you make the software available to others (over a network or distribution)
  • ❌ Hold authors liable
  • ❌ Use authors' names for promotion without permission

You MUST: - ⚠️ Disclose source code of modifications - ⚠️ Include original license and copyright - ⚠️ State changes made to the code - ⚠️ Make modified source available (if distributed) - ⚠️ Use same AGPL-3.0 license for derivatives

Network Use: - If you modify eMark and run it as a network service, you must make the source code available to users.

See LICENSE file for full details.


πŸ™ Support & Community

πŸ’¬ Get Help

🌟 Show Your Support

If eMark has helped you, please consider: - ⭐ Star the repository on GitHub - 🐦 Share on social media with #eMark - πŸ“ Write a blog post about your experience - πŸŽ₯ Create a tutorial video - πŸ’¬ Recommend to colleagues and friends

πŸ™ Acknowledgments

eMark is built on the shoulders of giants. Special thanks to:

  • Apache PDFBox - PDF rendering and manipulation
  • iText 5 - PDF digital signature creation
  • Bouncy Castle - Cryptography provider
  • FlatLaf - Modern Swing look and feel
  • All contributors who have helped improve eMark

πŸ“Š Project Statistics

GitHub stars GitHub forks GitHub issues GitHub pull requests


πŸ–ΌοΈ Screenshots

Click to expand screenshot gallery #### Main Interface Main Interface #### PDF Viewer with Signature Detection PDF Viewer #### Signature Field Detection Signature Field Detection #### Certificate Selection Certificate Selection #### Signature Appearance Customization Signature Appearance #### Signature Properties Signature Properties #### Keystore Settings Keystore Settings #### Security Settings Security Settings

For more screenshots and detailed documentation, visit: - πŸ“Έ Image Gallery - πŸ—ΊοΈ Architecture Diagrams


## ⭐ Star History [![Star History Chart](https://api.star-history.com/svg?repos=devcodemuni/eMark&type=Date)](https://star-history.com/#devcodemuni/eMark&Date) --- ## πŸ“’ Spread the Word If you find eMark useful, please help spread the word: [![Twitter](https://img.shields.io/twitter/url?style=social&url=https%3A%2F%2Fgithub.com%2Fdevcodemuni%2FeMark)](https://twitter.com/intent/tweet?text=Check%20out%20eMark%20-%20Free%20Adobe%20Reader%20DC%20Alternative%20for%20PDF%20Signing!&url=https://github.com/devcodemuni/eMark&hashtags=eMark,PDFSigning,OpenSource) --- ### πŸ” **Made with ❀️ for Secure PDF Signing and Open-Source Freedom** **[⭐ Star on GitHub](https://github.com/devcodemuni/eMark)** β€’ **[πŸ› Report Issues](https://github.com/devcodemuni/eMark/issues)** β€’ **[🀝 Contribute](CONTRIBUTING.md)** β€’ **[πŸ“₯ Download](https://github.com/devcodemuni/eMark/releases/latest)** --- Β© 2025 eMark Project β€’ Licensed under AGPL-3.0 β€’ [Privacy Policy](https://devcodemuni.github.io/eMark/) β€’ [Terms of Use](https://devcodemuni.github.io/eMark/) **Keywords:** PDF signer, digital signature, Adobe Reader DC alternative, Adobe Acrobat alternative, USB token, HSM, PKCS#11, PKCS#12, Windows certificate store, cross-platform, open source, free PDF signing, electronic signature, e-signature, document signing, certificate-based signing, timestamp, LTV, PAdES, enterprise security, privacy-focused, offline PDF signer
Source: README.md, updated 2025-10-24