Valere Fedronic
Valere Fedronic
In order to decide if a backup can be trusted to **upload** local keys, one of the following condition should be true: 1. The backup is signed by the user's...
Reference: [Olm unwedging MSC](https://github.com/uhoreg/matrix-doc/blob/olm_unwedging/proposals/1719-olm_unwedging.md) > When a device receives an olm-encrypted message that it cannot decrypt, it should assume that the olm session has become corrupted and create a new...
I have been investigating some rageshakes recently, and often we don't have enough log history to see when/if a key was correctly distributed to another device. This is an attempt...
### Problem Statement It is not possible to use posthog in an App Extension (Notification Service). Build Fails here https://github.com/PostHog/posthog-ios/blob/109e56bd9a96c7ad5ef4a4de0b6610aed5bab646/PostHog/UIViewController.swift#L34 With: > UIViewController.swift:34:44 'shared' is unavailable in application extensions for...
WebR: a session that has no private ssk cached should not be able to accept a verification request
... If it can, the verification dance will work but the session will not be cross-signed See https://github.com/element-hq/element-web/issues/21919
### Steps to reproduce 1. Create a new account from web 2. Set up secure backup (eventually create an e2ee room with some messages to have something to backup) 3....
The code is on MatrixChat.tsx in react sdk ``` cli.on(CryptoEvent.KeyBackupFailed, async (errcode): Promise => { let haveNewVersion: boolean | undefined; let newVersionInfo: IKeyBackupInfo | null = null; // if key...
part of invisible crypto, follow up of https://github.com/matrix-org/matrix-rust-sdk/pull/3607 Alternative fix for https://github.com/matrix-org/matrix-rust-sdk/issues/3564 Alternative PR https://github.com/matrix-org/matrix-rust-sdk/pull/3610 Add the capability to locally pin a public MSK for a `ReadOnlyUserIdentity`. The first time...
~~Draft because based on https://github.com/matrix-org/matrix-rust-sdk/pull/3605~~ Fixes https://github.com/matrix-org/matrix-rust-sdk/issues/3563 This PR just introduce a new way to distribute room keys based on identities, by only sharing with devices signed by their owner....
Part of MSC4153 (Invisible Crypto). #3563 added a new `IdentityBasedStrategy` room-key sharing strategy. #3564 added a "tofu" flag to `ReadOnlyUserIdentity`. We now need to update `share_room_keys` to check the tofu...