Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dehydrated device Settings #278

Open
BillCarsonFr opened this issue May 20, 2022 · 4 comments
Open

Dehydrated device Settings #278

BillCarsonFr opened this issue May 20, 2022 · 4 comments
Assignees
Labels
A-E2EE A-User-Settings T-Enhancement Team: Crypto Z-Chronic Z-Confidence-High High confidence in the enhancement or suggestion based on known factors, or as described.

Comments

@BillCarsonFr
Copy link
Member

BillCarsonFr commented May 20, 2022

Related to MSC2687
and MSC3814

Dehydrated device is adding the possibility for a user to still access e2ee messages that was sent to him when he had 0 active sessions (logged out from everywhere).
In order to do that, we declare a sort of virtual device on the account that will stack up to_devices messages until you decide to claim it. In order to claim it you need a passphrase (the virtual device is saved encrypted serverside)

Impact for users

In the settings, users will always see an additional device in their device list
image

This would be very confusing for the user.

We have to find another place to store that dehydrated device.
We might have some managment action on the device?
@uhoreg if you see things to add, or other UX need

Proposed Solution

  1. Hide the dehydrated device from the device list in setting as well as in user profile.
  2. We need a migration path for existing users. A toast or somewhere in settings. Security update available=> we need the 4S passphrase in order to generate a random key for dehydrated device and store it in 4S.
@BillCarsonFr
Copy link
Member Author

@amshakal we should find a place to gave some feedback if something went wrong.
Like if we tried to rehydrate in background and it fails (the key is not correct).
We might just want a section in security (doesn't have to be a global modal). From there the only action could be to reset the dehydrated device, i.e create a new one, and we need 4S passphrase for that

@uhoreg
Copy link
Member

uhoreg commented May 20, 2022

We should also figure out how to enable/disable device dehydration.

@BillCarsonFr
Copy link
Member Author

My idea was to bundle that with 4S. Not sure we need more fine grain configuration.

@kittykat kittykat added T-Enhancement Z-Chronic Z-Confidence-High High confidence in the enhancement or suggestion based on known factors, or as described. A-User-Settings labels Jan 19, 2023
@pmaier1
Copy link
Contributor

pmaier1 commented Jul 6, 2023

My idea was to bundle that with 4S. Not sure we need more fine grain configuration.

Yes. We should make device dehydration as transparent as possible to users - no new settings if we can avoid it. Agree to bind it to the backup. The dehydrated device also should not be visible in device lists.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
A-E2EE A-User-Settings T-Enhancement Team: Crypto Z-Chronic Z-Confidence-High High confidence in the enhancement or suggestion based on known factors, or as described.
Projects
None yet
Development

No branches or pull requests

5 participants