This has been a massive release in terms of encryption and authorization. We implemented a more modern TLS 1.2 encryption algorithm which is the today's de facto standard for advanced remote access software. The authorization system has also been significantly improved — now you can enable several authorization methods on the Host and use them side by side.
Another major improvement is 2-step verification (2FA, or "2 factor authentication"). This verification acts as an additional layer of protection against unauthorized access to your Hosts. With the 2-step verification enabled — you can use a smartphone app such as Google Authenticator to view the 2FA code — no one can get access to your Host even if they guess the password.