Feature #4370
only run linkify on messages that were received from trusted OTR keys
Status: | New | Start date: | 01/08/2015 | |
---|---|---|---|---|
Priority: | High | Due date: | ||
Assignee: | - | % Done: | 0% | |
Category: | - | |||
Target version: | v15 - AWESOME APP | |||
Component: |
Description
Since it is possible to send things like PGP and OTR fingerprints via URIs, as well as direct users to install software via market:
and https://play.google.com
links, the linkifying should only happen on messages that were received from a trusted OTR key. Perhaps this doesn't need to affect all linkifying, but it should definitely affect these:
- openpgp4fpr:5E61C8780F86295CE17D86779F0FE587374BBE81
- xmpp:hans@guardianproject?otr-fingerprint=DF953988F5C05788C0327186D06D3BB4DDAAEC7F
- https://play.google.com/store/apps/details?id=org.torproject.android
This is related to:
https://github.com/guardianproject/ChatSecureAndroid/pull/610
specifically:
https://github.com/eighthave/ChatSecureAndroid/commit/70e4fa1a6e77fefe22c4707c789514e41861ee88
aka commit 70e4fa1a6e77fefe22c4707c789514e41861ee88
History
#1 Updated by n8fr8 over 2 years ago
- Target version changed from v14 - Armadillo's Agram to v15 - AWESOME APP