Document the fields to be added to Olm and the checks to be done to mitigate the unknown key-share attacks.