This is an old revision of the document!
This is a section of the manual on how to use Element's end-to-end-encryption. To see the rest of the manual, find the page here
End-to-end encryption means that only the parties participating in a conversation are able to decrypt and read the messages that were send. Our server is not able to decrypt the messages that were sent, preventing third parties to read the messages.
Some chats you encounter will be encrypted. Direct conversations are encrypted by default and encryption for rooms for multiple people can be switched on. When using encryption in a room (or direct chat) all messages in that chat will be encrypted. Each of your clients (e.g. the web client at meet.physik.fu-berlin.de or Element on your phone) will have a session with its own keys. This is mostly transparent to you as a user, but you must always hold either of the following to be true to keep access to your old encrypted messages:
This means, that if you do have encrypted messages, e.g. in a direct chat, and you were only logged into one session, e.g. only in the web client, and you don't have a Security Phrase or Security Key set up, i.e. you log out and decline to set one up, when asked, you will lose access to those messages.
This may sound difficult, but it's not. Read on for what you need to do.
When you haven't set up a Security Phrase or Recovery Key and are about to log out of your only session Element will ask you to set one up. You can also do this manually. Open the Security & privacy menu in the Settings.
Below the list of active sessions, you will find section Secure Backup, that will look like this, if you haven't set it up yet
Click on Set up to start. You will be shown this menu
By default the upper point (Generate a Security Key) is selected, but it's better to choose Enter a Security Phrase. What's the difference?
Also, when you generate a Security Phrase, you will be offered to generate a Security Key as well. So why not get both for the price of one?
Once you click Continue you can enter your passphrase
which you then need to confirm
Afterwards you will be offered to also get your Security Key
And to finish the setup, you need to confirm everything with your ZEDAT password
After you're done with you can have a look at the settings again, where it will look like this if you were successful.
This is also where you can start over - via the Reset button - if you forget your Security Phrase and/or lose your Security Key, but still have access to your session, because you never log out.
To access your messages from encrypted chats, e.g. direct conversations, it is necessary to verify a new session. To verify a session you can either confirm a new session from an existing session, which is the easiest way, or enter your recovery passphrase.
When logging in with a new device you will get prompted to verify it.
The three options: - Use another login, which will authenticate against a running session, e.g. on a phone or another computer. - Use Security Key or Phrase, which works without another session, i.e. without another device, but you will need the Security Phrase or Key that you set up earlier. - Skip, which skips authentication, but you won't be able to read encrypted messages that were sent to you earlier.
This is conceptually the easiest so, we'll discuss it first. Click Use Security Key or Phrase and in the screen that opens enter either your Security Phrase or your Security Key.
If you enter either correctly, you will be greeted by this happy screen
If you are logged into another session, e.g. on your phone, it's easiest to click Use another login. There are multiple ways how this is handled, which depends on where the other session is running, e.g. Element on phones will allow you to do this via scanning a QR code. All methods do require, though, that you have the device where the other session is running on at hand otherwise the whole process will block waiting for you to do something on the other device, which is hard to do, if it's far away.
One method that is always available is comparing emoji shown on both devices. First you will be asked on the device with an already authenticated session whether the new session is you and whether you want to authenticate it.
Click on the green "Verify" button in the popup and an explaining popup will appear.
Select to continue and you will be asked for a verification method.
Compare the emojis in the two sessions.
Confirm the emojis match on both devices to complete verifying the session and you get the happy result of a verified session.
If you have old unverified sessions that you don't have access to anymore, it is best to delete them so that other users don't see you as unverified.
To find out if you have unverified sessions left, enter a chat in which you participate and find your name in the user sidebar on the left. If you have unverified sessions, there will be a red shield icon on your user icon.
If you have unverified sessions, click on your name in the sidebar. This will show you a list of your sessions and which of them are unverified.
Click on each of the unverified sessions which you can not access anymore and note down their session-ID. (In the picture below it is VBPCSWTETS)
To delete the session you noted down, click on your Name in the top left corner and select the settings.
In the settings menu select the section "Security & Privacy"
In the "Security & Privacy" setting select all the session you want to delete and click on "Delete sessions"
For end-to-end encryption to be really secure users have to verify they are talking to each other. To do this each user is verifying each their devices, and additionally verifies every user once. Every device another verified user verified themselves will be considered verified.
Example: Alice and Bob start a conversation in their logged in sessions. For the encryption to be secure they have to verify they are actually talking to each other. In Element this is done by comparing a list of emojis that are shown to both users. Alice requests a verification with Bob and they verify they get shown the same string of emojis. When Bob starts using a new session (e.g. using a different Browser/Device) he can use the session that was verified with Alice's session to also verify his new session. Alice's session automatically sees that Bob verified the new session and accepts it into the encrypted conversation.
For this step to make sense you have to be able to communicate with the other user in a way that makes sure you are actually talking to them. For this we recommend video/audio-chat, or just sitting next to each other.
To verify a user you open a chat you share with the user and click their name in the user side bar.
Click on the verify link in the sidebar…
and click on the "Start Verification" button.
The user you want to verify will see the request as a popup on the left and in the chat.
You will then be presented with the verification options. Currently the only option is comparing a string of emojis. When both users have agreed on a verification method the verification process begins.
If the user you are verifying with is shown the same string of emojis as you are, you can both click on "They match" to complete the verification.
Sometimes it happens. Your computer and phone die at the same time and those were the only clients you were logged in at and you didn't save your passwordmanager database (hopefully you are using one) where you store your recovery keys or recovery passphrase to any other device. What now?
Well, all your encrypted messages, i.e. messages in rooms or private discussions were encryption was enabled, are gone and you won't get them back, but you can make yourself new recovery keys for the future (and hopefully you will safe them redundantly). To this, just click Use Security Key or Phrase
on the verification dialog after login and instead of entering your security phrase or key, which you've lost, click the Reset all link on the bottom, next to Forgotten or lost all recovery methods?
You will then be asked to confirm
And clicking Reset will sign out of all your old sessions and delete all keys, followed by guiding you through the procedure to generate new ones described above.