Improve the E2EE device verification and keys requesting flow #18881
Labels
A-E2EE-Cross-Signing
O-Frequent
Affects or can be seen by most users regularly or impacts most users' first experience
S-Major
Severely degrades major functionality or product features, with no satisfactory workaround
T-Enhancement
X-Needs-Design
X-Needs-Investigation
Currently the flow to request keys to unencrypt old messages on a new device is extremely confusing for a lot of users. We don't provide enough data to the users that they will be able to unecrypt only messages from cross-verified sessions, and not from all the verified sessions.
There's also the case where users click "request keys" link under a message, but that doesn't do anything because this session is not cross-verified with a session that has those keys.
The general idea about this issue is to:
Probably adding a way to see which sessions are cross-verified in the sessions list would be quite useful too, but if I remember correctly we don't exactly have a way of knowing this?
Related: #18652
The text was updated successfully, but these errors were encountered: