-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to decrypt cause: sometimes the key backup doesn't contain the key you need #2327
Comments
A likely realistic scenario for this:
|
Should a "dehydrated device" be the solution for this scenario? (#922?) |
Dehydrated devices may help, depending on how we implement it. With dehydrated devices, when you log in, you always rehydrate the device when you log in, so you will receive any keys that were sent to the dehydrated device. So even if you have other devices, you can use the dehydrated device to get keys that were sent before you logged in (and after the dehydrated device was created). However, we are looking into whether we should avoid sending keys to dehydrated devices if the user has other devices available as a way to reduce the number of to-device events they will accumulate and reduce the chances of using up all the OTKs. So if we do something like: "don't send keys to dehydrated devices if the user has any other devices", then it won't help in this scenario. If we do something like: "don't send keys to dehydrated devices if the user has fewer than n other devices", then it may help. |
This issue isn't very actionable as it stands.
I've opened #2421 to track these problems.
We should track these separately under their own issues. |
Sometimes users log in on a new device, but despite verifying the device and successfully connecting it to key backup, necessary keys cannot be found, so messages remain undecryptable. Potential causes might include:
This failure mode is hard to debug (since we normally only get a rageshake from the new device which can't get the keys from backup), and hard to manage user expectations for.
The text was updated successfully, but these errors were encountered: