summary refs log tree commit diff
path: root/resources/qml/EncryptionIndicator.qml
diff options
context:
space:
mode:
authorNicolas Werner <nicolas.werner@hotmail.de>2023-11-19 20:09:38 +0100
committerNicolas Werner <nicolas.werner@hotmail.de>2023-11-19 20:11:21 +0100
commitff82452816449eb9ccea872bf192cf153d596858 (patch)
tree15beb18e9239c30f5f2ca44533bf07847c3482cf /resources/qml/EncryptionIndicator.qml
parentTranslated using Weblate (Chinese (Simplified)) (diff)
downloadnheko-ff82452816449eb9ccea872bf192cf153d596858.tar.xz
Upgrade trust of megolm sessions when receiving RoomKey
Before we only did that, when we basically didn't have the key yet. But
since we usually get sent a RoomKey when a new message is sent after we
sign in, we were discarding, that those messages should usually now be
trusted.
Diffstat (limited to 'resources/qml/EncryptionIndicator.qml')
-rw-r--r--resources/qml/EncryptionIndicator.qml5
1 files changed, 4 insertions, 1 deletions
diff --git a/resources/qml/EncryptionIndicator.qml b/resources/qml/EncryptionIndicator.qml
index b606a531..99ccebd4 100644
--- a/resources/qml/EncryptionIndicator.qml
+++ b/resources/qml/EncryptionIndicator.qml
@@ -21,6 +21,7 @@ Image {
         case Crypto.TOFU:
             return "image://colorimage/:/icons/icons/ui/shield-filled.svg?";
         case Crypto.Unverified:
+        case Crypto.MessageUnverified:
             return "image://colorimage/:/icons/icons/ui/shield-filled-exclamation-mark.svg?";
         default:
             return "image://colorimage/:/icons/icons/ui/shield-filled-cross.svg?";
@@ -39,8 +40,10 @@ Image {
             return qsTr("Encrypted by a verified device");
         case Crypto.TOFU:
             return qsTr("Encrypted by an unverified device, but you have trusted that user so far.");
+        case Crypto.MessageUnverified:
+            return qsTr("Key is from an untrusted source like forwarded from another user or the online key backup. For this reason we can't verify who sent the message.");
         default:
-            return qsTr("Encrypted by an unverified device or the key is from an untrusted source like the key backup.");
+            return qsTr("Encrypted by an unverified device.");
         }
     }
     ToolTip.visible: stateImg.hovered