⚠️ Warning: Do not download Electrum from any source other than electrum.org. Always verify GPG signatures.

Latest release: Electrum-4.6.2

Release notesPrevious releases

The binaries are reproducible, and are signed independently by several builders.

Current executables are signed by ThomasV, SomberNight, Emzy, and Pedro.

Sources and Binaries

Python (3.10 and higher) Electrum-4.6.2.tar.gz Signatures
Linux AppImage (x86_64, glibc 2.31+) Signatures
Windows (10/11, x86_64) Standalone Executable Signatures
Windows Installer Signatures
Portable version (security advice) Signatures
macOS (11+ Intel and Apple Silicon) Executable for macOS Signatures
Android (6.0 and higher) (available on Google Play) (available on F-Droid) (8+) arm 64-bit (armv8-a, recommended) Signatures
arm 32-bit (armeabi-v7a)
Signatures
x86_64 Signatures

Installation from Python sources

linux Install dependencies: sudo apt-get install python3-pyqt5 libsecp256k1-dev python3-cryptography
Download package: wget https://download.electrum.org/4.6.2/Electrum-4.6.2.tar.gz
Verify signatures: wget https://download.electrum.org/4.6.2/Electrum-4.6.2.tar.gz.asc
gpg --verify Electrum-4.6.2.tar.gz.asc
Run without installing: tar -xvf Electrum-4.6.2.tar.gz
python3 Electrum-4.6.2/run_electrum
Install with PIP: sudo apt-get install python3-setuptools python3-pip
python3 -m pip install --user Electrum-4.6.2.tar.gz

How to verify GPG signatures

GPG signatures are a proof that distributed files have been signed by the owner of the signing key. For example, if this website was compromised and the original Electrum files had been replaced, signature verification would fail, because the attacker would not be able to create valid signatures. (Note that an attacker would be able to create valid hashes, this is why we do not publish hashes of our binaries here, it does not bring any security).

In order to be able to verify GPG signatures, you need to import the public key of the signer. Electrum binaries are signed with ThomasV's public key. On Linux, you can import that key using the following command: gpg --import ThomasV.asc. When you import a key, you should check its fingerprint using independent sources, such as here, or use the Web of Trust.

Notes for Windows users

Some anti-virus software may flag Electrum binaries as unsafe due to heuristic scanning. Always verify GPG signatures to confirm authenticity.

Older Windows versions might need KB2999226 update.