diff options
author | Nicolas Werner <nicolas.werner@hotmail.de> | 2023-11-19 20:09:38 +0100 |
---|---|---|
committer | Nicolas Werner <nicolas.werner@hotmail.de> | 2023-11-19 20:11:21 +0100 |
commit | ff82452816449eb9ccea872bf192cf153d596858 (patch) | |
tree | 15beb18e9239c30f5f2ca44533bf07847c3482cf /resources/qml | |
parent | Translated using Weblate (Chinese (Simplified)) (diff) | |
download | nheko-ff82452816449eb9ccea872bf192cf153d596858.tar.xz |
Upgrade trust of megolm sessions when receiving RoomKey
Before we only did that, when we basically didn't have the key yet. But since we usually get sent a RoomKey when a new message is sent after we sign in, we were discarding, that those messages should usually now be trusted.
Diffstat (limited to 'resources/qml')
-rw-r--r-- | resources/qml/EncryptionIndicator.qml | 5 |
1 files changed, 4 insertions, 1 deletions
diff --git a/resources/qml/EncryptionIndicator.qml b/resources/qml/EncryptionIndicator.qml index b606a531..99ccebd4 100644 --- a/resources/qml/EncryptionIndicator.qml +++ b/resources/qml/EncryptionIndicator.qml @@ -21,6 +21,7 @@ Image { case Crypto.TOFU: return "image://colorimage/:/icons/icons/ui/shield-filled.svg?"; case Crypto.Unverified: + case Crypto.MessageUnverified: return "image://colorimage/:/icons/icons/ui/shield-filled-exclamation-mark.svg?"; default: return "image://colorimage/:/icons/icons/ui/shield-filled-cross.svg?"; @@ -39,8 +40,10 @@ Image { return qsTr("Encrypted by a verified device"); case Crypto.TOFU: return qsTr("Encrypted by an unverified device, but you have trusted that user so far."); + case Crypto.MessageUnverified: + return qsTr("Key is from an untrusted source like forwarded from another user or the online key backup. For this reason we can't verify who sent the message."); default: - return qsTr("Encrypted by an unverified device or the key is from an untrusted source like the key backup."); + return qsTr("Encrypted by an unverified device."); } } ToolTip.visible: stateImg.hovered |