Valere Fedronic

Results 125 issues of Valere Fedronic

In order to decide if a backup can be trusted to **upload** local keys, one of the following condition should be true: 1. The backup is signed by the user's...

enhancement
encryption
backup

Reference: [Olm unwedging MSC](https://github.com/uhoreg/matrix-doc/blob/olm_unwedging/proposals/1719-olm_unwedging.md) > When a device receives an olm-encrypted message that it cannot decrypt, it should assume that the olm session has become corrupted and create a new...

encryption

I have been investigating some rageshakes recently, and often we don't have enough log history to see when/if a key was correctly distributed to another device. This is an attempt...

### Problem Statement It is not possible to use posthog in an App Extension (Notification Service). Build Fails here https://github.com/PostHog/posthog-ios/blob/109e56bd9a96c7ad5ef4a4de0b6610aed5bab646/PostHog/UIViewController.swift#L34 With: > UIViewController.swift:34:44 'shared' is unavailable in application extensions for...

enhancement
AppExtension
CocoaPods

... If it can, the verification dance will work but the session will not be cross-signed See https://github.com/element-hq/element-web/issues/21919

T-Defect
S-Major
A-E2EE
O-Uncommon
A-Element-R

### Steps to reproduce 1. Create a new account from web 2. Set up secure backup (eventually create an e2ee room with some messages to have something to backup) 3....

T-Defect
S-Minor
A-E2EE
A-E2EE-Key-Backup
O-Uncommon

The code is on MatrixChat.tsx in react sdk ``` cli.on(CryptoEvent.KeyBackupFailed, async (errcode): Promise => { let haveNewVersion: boolean | undefined; let newVersionInfo: IKeyBackupInfo | null = null; // if key...

T-Defect
S-Major
A-E2EE
A-E2EE-Key-Backup
O-Occasional
Z-Labs
A-Element-R

part of invisible crypto, follow up of https://github.com/matrix-org/matrix-rust-sdk/pull/3607 Alternative fix for https://github.com/matrix-org/matrix-rust-sdk/issues/3564 Alternative PR https://github.com/matrix-org/matrix-rust-sdk/pull/3610 Add the capability to locally pin a public MSK for a `ReadOnlyUserIdentity`. The first time...

~~Draft because based on https://github.com/matrix-org/matrix-rust-sdk/pull/3605~~ Fixes https://github.com/matrix-org/matrix-rust-sdk/issues/3563 This PR just introduce a new way to distribute room keys based on identities, by only sharing with devices signed by their owner....

Part of MSC4153 (Invisible Crypto). #3563 added a new `IdentityBasedStrategy` room-key sharing strategy. #3564 added a "tofu" flag to `ReadOnlyUserIdentity`. We now need to update `share_room_keys` to check the tofu...

encryption