-
Notifications
You must be signed in to change notification settings - Fork 254
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Element X: Two Olm Machines created in a row with same deviceId but different keys #2998
Comments
Note that this is a potential cause of #1415. |
Root cause of element-hq/element-x-ios#2287 During the login flow of EX, a first client is created with an in memory store, then after login a new client is created with a database store (the user_id is needed to create the database path). The problem is that the first "in memory" client starts to initialize cryptography, i.e upload device keys, create cross-signing keys if needed, create backup if needed. Then the second client will try to do the same, but it will detect that keys/identities/backup are already published and this will impact bootstrap (also all the private keys of the published keys will be lost) |
Rageshake https://github.com/element-hq/element-x-android-rageshakes/issues/1134
As part of login flow
Then a few seconds after from restore_session
=> breaking encryption
(also causing the one time key exists problem)
The text was updated successfully, but these errors were encountered: