this post was submitted on 02 Feb 2025
43 points (89.1% liked)
Opensource
1782 readers
101 users here now
A community for discussion about open source software! Ask questions, share knowledge, share news, or post interesting stuff related to it!
⠀
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Btw, what kind of events were sent to the room? I suspect that's important to know when judging if that's been power abuse or simple server maintenance.
I thought the same at first, but honestly, there's probably nothing that warrants impersonation. If it's a system announcement or change from the host, it should be labeled as such.
Sure. I haven't looked into the technical details. Impersonation often is a crutch to deal with technical shortcomings. Though in this scenario it changes the whole story, whether the admin does someone a favor or is acting maliciously. And I'm not even sure if this allows to break encryption. At least in the old days, Element would ask me to verify each new device. And the admin doesn't have access to the encryption keys, since they're stored with the client. So I'm not sure what's happening here and I'm also not sure about the implications. Just seemed kind of fishy to me to omit that kind of information in a longer article. Can the admin do more than thange the room version and maybe kick or ban people? Because that would be well within their job.