Trust all IdentityKeys
The trust-on-first-use policy leads to problems when receiving messages from two different devices of a contact before sending a message to them (as their IdentityKeys will not have been added yet). Since session trust will be managed externally anyway, this change is not a security problem, and will allow us to decrypt messages from yet-untrusted sessions.
This commit is contained in:
parent
72619de889
commit
4cc4e81b8e
|
@ -233,8 +233,9 @@ public class AxolotlService {
|
||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
public boolean isTrustedIdentity(String name, IdentityKey identityKey) {
|
public boolean isTrustedIdentity(String name, IdentityKey identityKey) {
|
||||||
Set<IdentityKey> trustedKeys = mXmppConnectionService.databaseBackend.loadIdentityKeys(account, name);
|
//Set<IdentityKey> trustedKeys = mXmppConnectionService.databaseBackend.loadIdentityKeys(account, name);
|
||||||
return trustedKeys.isEmpty() || trustedKeys.contains(identityKey);
|
//return trustedKeys.isEmpty() || trustedKeys.contains(identityKey);
|
||||||
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
// --------------------------------------
|
// --------------------------------------
|
||||||
|
|
Loading…
Reference in New Issue