-
Notifications
You must be signed in to change notification settings - Fork 493
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Element iOS ignores m.secret_storage.default_key
?
#4569
Comments
From my tests element iOS does use Looking at the code however, a corruption of the locally stored client account data could give rise to the creation of multiple keys and potentially the issue of no passphrase being offered. With our current implementation If Similarly if A workaround for the user would be to clear the cache if that option is available in the UI or else logout(clearing data) and back in. Without knowing the source of the corruption or reproducible steps, we could try to improve the user experience by making the client more gracefully recover from the corrupt state. One potential approach to make this more robust could be to validate both the state of crypto and account data on launch before we proceed to setup or key/passphrase entry. If the check fails we could give the user a way to recover(hard logout? reset cache button? just auto reset cache?). |
I have a client that has somehow ended up with several SSSS keys, most of which are empty (fine) and another two of which one has a passphrase and one doesn't. The default key is set to the one with the passphrase but iOS is allegedly not offering passphrase auth, suggesting it's picking up the other key rather than the default.
The text was updated successfully, but these errors were encountered: