Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Invisible Crypto: User Identity notice are displayed in clear room #2560

Open
2 of 3 tasks
BillCarsonFr opened this issue Oct 8, 2024 · 12 comments
Open
2 of 3 tasks
Labels

Comments

@BillCarsonFr
Copy link
Member

BillCarsonFr commented Oct 8, 2024

Follow-up on #2491

Currently the TOFU identity change notice is displayed if you are in a non encrypted room

image

=> We might want to only show that in e2ee rooms.

(Definitly should not do it in clear room for verified identity changes)

Tasks

  1. T-Task
    pixlwave
@andybalaam
Copy link

andybalaam commented Oct 14, 2024

Android: element-hq/element-x-android#3630

Web: we will do this as part of #2513

iOS: @mxandreas will make a ticket

@mxandreas
Copy link

Created a ticket for iOS, cc @manuroe .

@pixlwave
Copy link
Member

How come this is a client-side issue and not an SDK issue? I would expect this callback to never be used when the room is unencrypted.

@andybalaam
Copy link

How come this is a client-side issue and not an SDK issue? I would expect this callback to never be used when the room is unencrypted.

So would you expect calling subscribe_to_identity_status_changes to do nothing in an unencrypted room? That would seem quite surprising to me...

I would have thought it would be more sensible not to call it in an unencrypted room?

@pixlwave
Copy link
Member

Ah I see what you mean. We don't have any logic around what we do/don't subscribe to, my understanding of it being a client issue was to still subscribe to it and filter out any updates based upon the encryption state of the room. Doing what you suggested makes wayyy more sense to me though!

(It wouldn't handle the possibility of encryption being enabled by someone after opening the room, but I'm happy to ignore that if you aren't bothered about this edge case?).

@pixlwave
Copy link
Member

PR here: element-hq/element-x-ios#3414

@andybalaam
Copy link

(It wouldn't handle the possibility of encryption being enabled by someone after opening the room, but I'm happy to ignore that if you aren't bothered about this edge case?).

Will it self-heal if you switch away to a different room and back? If so it seems pretty minor, but we should log it as a known issue.

@pixlwave
Copy link
Member

Exactly, yes. We create one of the RoomProxy objects each time you open a room and dispose of it when you pop back out of that room flow.

we should log it as a known issue.

In an issue on EXI, or do you have a better place to track this on the crypto side?

@andybalaam
Copy link

In an issue on EXI, or do you have a better place to track this on the crypto side?

I would think EXI, and EXA if a similar problem exists there. cc @bmarty

@pixlwave
Copy link
Member

Done here: element-hq/element-x-ios#3417

@andybalaam
Copy link

Awesome, thank you!

@manuroe
Copy link
Member

manuroe commented Oct 17, 2024

thanks @pixlwave! I removed you as assignee to make clear that we do not work anymore on this item.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

5 participants