You are viewing a single comment's thread from:
RE: Understanding End-to-End Encryption with ECDH: A Deep Dive
Also, you have another challenge : when the user generates new keys for their account, all previous messages disappear. I’m not sure if that’s a problem for you or not
Really? I think no. Encryption is made to the counter parties so if they use the valid key then it should decrypt at any stage.
I think you misunderstood me. What I mean is this: When a user generates new keys for their account, both the public and private keys are replaced. As a result, all previously encrypted messages become inaccessible. Even for the other party — who did not change their keys — decryption will fail because the other user's public key has been replaced. The new keys cannot decrypt the old messages; only the old keys remain valid for decrypting previously encrypted messages. The new keys are incompatible with those messages, effectively making them irretrievable.
Example:
User 1 and User 2 exchange encrypted messages . Later, when User 1 generates a new keys, both User 1's and User 2's past messages in that conversation can no longer be decrypted because they were tied to the old keys, which are now replaced.
Congratulations! This post has been upvoted through steemcurator08. We support quality posts, good comments anywhere, and any tags.
Curated by @miftahulrizky
Right! there's also no solution for it! One should keep the previous memo too if changing password!