Latest release: Electrum-4.0.2

Release notes - Previous releases
Sources and executables are signed by ThomasV.
Linux and Windows builds are reproducible, and signed by several developers. See the list here

Sources and Binaries

Python (3.6.1 and higher) Electrum-4.0.2.tar.gz signature
Linux Appimage signature
Windows (7 and higher) Standalone Executable signature
Windows Installer signature
Portable version (security advice) signature
OSX (10.13 and higher) Executable for OS X signature
Android (5.0 and higher)
(available on Google Play)
64 bit signature
32 bit signature

Installation from Python sources

Linux Install dependencies: sudo apt-get install python3-pyqt5 libsecp256k1-0 python3-cryptography
Download package: wget
Verify signature: wget
gpg --verify Electrum-4.0.2.tar.gz.asc
Run without installing: tar -xvf Electrum-4.0.2.tar.gz
python3 Electrum-4.0.2/run_electrum
Install with PIP: sudo apt-get install python3-setuptools python3-pip
python3 -m pip install --user Electrum-4.0.2.tar.gz

How to verify GPG signatures

GPG signatures are a proof that distributed files have been signed by the owner of the signing key. For example, if this website was compromised and the original Electrum files had been replaced, signature verification would fail, because the attacker would not be able to create valid signatures. (Note that an attacker would be able to create valid hashes, this is why we do not publish hashes of our binaries here, it does not bring any security).

In order to be able to verify GPG signatures, you need to import the public key of the signer. Electrum binaries are signed with ThomasV's public key. On Linux, you can import that key using the following command: gpg --import ThomasV.asc. Here are tutorials for Windows and MacOS. When you import a key, you should check its fingerprint using independent sources, such as here, or use the Web of Trust.

Notes for Windows users

Electrum binaries are often flagged by various anti-virus software. There is nothing we can do about it, so please stop reporting that to us. Anti-virus software uses heuristics in order to determine if a program is malware, and that often results in false positives. If you trust the developers of the project, you can verify the GPG signature of Electrum binaries, and safely ignore any anti-virus warnings. If you do not trust the developers of the project, you should build the binaries yourself, or run the software from source. Finally, if you are really concerned about malware, you should not use an operating system that relies on anti-virus software.

Old versions of Windows might need to install the KB2999226 Windows update.