Update end_to_end_encryption.md

This commit is contained in:
Johannes Marbach 2025-05-28 12:16:25 +02:00 committed by GitHub
parent 910afe17b3
commit ed878f1c14
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -1588,15 +1588,6 @@ A failure to complete these verifications does not necessarily mean that
the session is bogus; however it is the case that there is no proof that the session is bogus; however it is the case that there is no proof that
the claimed sender is accurate, and the user should be warned accordingly. the claimed sender is accurate, and the user should be warned accordingly.
If a client has multiple sessions established with another device, it
should use the session from which it last received and successfully
decrypted a message. For these purposes, a session that has not received
any messages should use its creation time as the time that it last
received a message. A client may expire old sessions by defining a
maximum number of olm sessions that it will maintain for each device,
and expiring sessions on a Least Recently Used basis. The maximum number
of olm sessions maintained per device should be at least 4.
###### Recovering from undecryptable messages ###### Recovering from undecryptable messages
Occasionally messages may be undecryptable by clients due to a variety Occasionally messages may be undecryptable by clients due to a variety