Trust all IdentityKeys
The trust-on-first-use policy leads to problems when receiving messages from two different devices of a contact before sending a message to them (as their IdentityKeys will not have been added yet). Since session trust will be managed externally anyway, this change is not a security problem, and will allow us to decrypt messages from yet-untrusted sessions.
This commit is contained in:
parent
72619de889
commit
4cc4e81b8e
|
@ -233,8 +233,9 @@ public class AxolotlService {
|
|||
*/
|
||||
@Override
|
||||
public boolean isTrustedIdentity(String name, IdentityKey identityKey) {
|
||||
Set<IdentityKey> trustedKeys = mXmppConnectionService.databaseBackend.loadIdentityKeys(account, name);
|
||||
return trustedKeys.isEmpty() || trustedKeys.contains(identityKey);
|
||||
//Set<IdentityKey> trustedKeys = mXmppConnectionService.databaseBackend.loadIdentityKeys(account, name);
|
||||
//return trustedKeys.isEmpty() || trustedKeys.contains(identityKey);
|
||||
return true;
|
||||
}
|
||||
|
||||
// --------------------------------------
|
||||
|
|
Loading…
Reference in New Issue