You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As part of our work on UTDs it has become apparent that one source of UTDs is around historical messages before the client logged in. In this scenario, the sender will not encrypt for the target device, which is to be expected. If key backup is enabled and the user has >1 client, the newly logged in client should still be able to read the message because another client has decrypted and uploaded the key.
There is evidence this is not working as intended:
Uh oh!
There was an error while loading. Please reload this page.
As part of our work on UTDs it has become apparent that one source of UTDs is around historical messages before the client logged in. In this scenario, the sender will not encrypt for the target device, which is to be expected. If key backup is enabled and the user has >1 client, the newly logged in client should still be able to read the message because another client has decrypted and uploaded the key.
There is evidence this is not working as intended:
SessionData
contains curve keys inforwarding_curve25519_key_chain
matrix-org/matrix-rust-sdk#3247All these cases will cause UTDs which are visible to the end-user. The above rageshakes were from Matthew and Patrick A as well as community members.
Separately to this, there is a class of expected UTDs which can occur which we currently do not have good support for. Consider:
We need to figure out a solution for this failure mode, whether it is hiding the events as "expected UTDs" or otherwise.
Definition of done:
SessionData
contains curve keys inforwarding_curve25519_key_chain
matrix-org/matrix-rust-sdk#3247The text was updated successfully, but these errors were encountered: