I’m a random user but I did hear some discussion on the potential for this kind of vulnerability a while ago in the XMPP Conversations group chat.
OMEMO does not allow access to previous messages when you add a new device. If the message wasn’t originally encrypted for the target device, the device will not be able to read it. But the best place to ask this question is in that group chat.
How does XMPP with omemo handle these situations?
AFAIK they don’t exist because OMEMO keys are device and not account specific, so this entire class of attack surface does not exist.
@poVoq @sexy_peach
Isn’t matrix also based on session keys?
I think the issue is more about how keys are shared between devices, and access to previous messages granted?
I am not an expert on the topic, but yes the key sharing seems to be the ultimate source of these issues.
@sexy_peach @cypherpunks
I’m a random user but I did hear some discussion on the potential for this kind of vulnerability a while ago in the XMPP Conversations group chat.
OMEMO does not allow access to previous messages when you add a new device. If the message wasn’t originally encrypted for the target device, the device will not be able to read it. But the best place to ask this question is in that group chat.