Skip to content
Snippets Groups Projects
_index.en.md 3.82 KiB
Newer Older
  • Learn to ignore specific revisions
  • Marvin Dropp's avatar
    Marvin Dropp committed
    ---
    title: "Encryption"
    date: 2020-07-03T13:20:58+02:00
    draft: false
    chapter: true
    weight: 60
    ---
    
    # Use of end-to-end encryption
    
    
    Benedict Reuschling's avatar
    Benedict Reuschling committed
    By default, 1:1 calls are end-to-end encrypted now. Therefore, a configured key backup as well as a verification of all self-used client devices is recommended ([Important settings]({{< ref "settings" >}}))
    
    Marvin Dropp's avatar
    Marvin Dropp committed
    
    
    Benedict Reuschling's avatar
    Benedict Reuschling committed
    The decision whether a created room should be encrypted in this way must be well thought out and cannot be undone. If the room is large or public, checking all keys of all participants can take a lot of time. This manual check is done later on occasion and end-to-end encrypted conversations are started directly with blind trust for the time being.
    
    Marvin Dropp's avatar
    Marvin Dropp committed
    
    ![Create new room with activated encryption](/images/01_Create-Room-wE2E_en.png)
    
    
    Benedict Reuschling's avatar
    Benedict Reuschling committed
    If end-to-end encryption (E2EE) to interlocutor:inside in an unencrypted room is needed, click on the settings of the desired room (or in the room via "Room info" > "Room settings" in the upper right corner):
    
    Marvin Dropp's avatar
    Marvin Dropp committed
    
    ![Menu to get to the room settings](/images/02_Roomsettings_en.png)
    
    
    Benedict Reuschling's avatar
    Benedict Reuschling committed
    To do this, activate the Encrypted slider on the Security & Privacy tab:
    
    Marvin Dropp's avatar
    Marvin Dropp committed
    
    ![Enable encryption in the room settings](/images/03_Roome2e_en.png)
    
    
    Benedict Reuschling's avatar
    Benedict Reuschling committed
    Confirm with OK. From now on only those involved in the conversation are able to read the messages. When no key protection has been set up in the settings before, do it now (see [Important settings]({{< ref "settings" >}})) to read earlier messages and those received in absence.
    
    Marvin Dropp's avatar
    Marvin Dropp committed
    
    
    Benedict Reuschling's avatar
    Benedict Reuschling committed
    The encrypted exchange can begin now. To verify the correctness of the keys and to document this trustworthiness digitally, first unfold the sidebar by clicking on the person symbol in the upper right corner:
    
    Marvin Dropp's avatar
    Marvin Dropp committed
    
    ![open the list of persons in the room](/images/04_RoomPeople_en.png)
    
    
    Benedict Reuschling's avatar
    Benedict Reuschling committed
    Click the contact person in the opening bar of the participants in the conversation:
    
    Marvin Dropp's avatar
    Marvin Dropp committed
    
    ![room with note that not all participants are verified](/images/05_People-Unverified_en.png)
    
    
    Benedict Reuschling's avatar
    Benedict Reuschling committed
    The bar shows the conversation person in detail now. Here a key verification is initiated by clicking on "Verify". The other side is notified by clicking on "Start Verification". After confirmation (see next picture) the "Verification by Emojis" starts.
    
    Marvin Dropp's avatar
    Marvin Dropp committed
    
    ![Menu to the person to verify selected with the verify button](/images/06_E2EE_Verify_en.png)
    
    ![Menu to start the verification](/images/07_E2EE_Accept_en.png)
    
    
    Benedict Reuschling's avatar
    Benedict Reuschling committed
    This verification should be done with the contact person by comparison (e.g. verbally via telephone, in the same room or other medium). Since this is not always easy, the trust can also be expressed first (otherwise the verification is asked again and again) and carried out on occasion (e.g. at the next meeting).
    
    Marvin Dropp's avatar
    Marvin Dropp committed
    
    
    Benedict Reuschling's avatar
    Benedict Reuschling committed
    A detailed description of the topic is shown in this [video by Prof. Plikat](https://invidious.ggc-project.de/VOxfa6dqXSk) and [in this Matrix blog article](https://blog.riot.im/e2e-encryption-by-default-cross-signing-is-here).
    
    Marvin Dropp's avatar
    Marvin Dropp committed
    
    
    Benedict Reuschling's avatar
    Benedict Reuschling committed
    The adjustment itself is done via emoji images or QR codes, which look different depending on the device and icon pack. Also, the translation of all interface elements into German is not 100% available.
    
    Marvin Dropp's avatar
    Marvin Dropp committed
    
    ![Emoji comparison to verify the key exchange](/images/16_E2EE.png)
    
    This is done analogously in rooms with several participants, each one individually. 
    
    ![verification process was successful](/images/08_Verified_en.png)
    
    
    Benedict Reuschling's avatar
    Benedict Reuschling committed
     The following symbols indicate the status of the encryption and the corresponding verification in the respective room rows:
    
    Marvin Dropp's avatar
    Marvin Dropp committed
    
    ![symbol for at least one non-verified person](/images/gray.png)
    
    At least one person in the room has not yet been verified.
    
    ![symbol for a verified person who has opened unverified sessions](/images/unverified.png)
    
    There is at least one person in the room who has already been verified, but who in turn has opened further unverified sessions. 
    
    ![symbol for all persons in the room are verified](/images/green.png)
    
    All persons in the room were verified.