diff --git a/content/client-server-api/modules/end_to_end_encryption.md b/content/client-server-api/modules/end_to_end_encryption.md index e4d8137d..f68c2fce 100644 --- a/content/client-server-api/modules/end_to_end_encryption.md +++ b/content/client-server-api/modules/end_to_end_encryption.md @@ -1010,13 +1010,8 @@ against this. 2. Clients MUST fix the keys that are being verified at the beginning of the verification process, and ensure that they do not change in the course of verification. -3. Clients SHOULD also display a warning and MAY refuse to verify a user when - it detects that the user has a device with the same ID as a cross-signing - key. -4. If a client does not detect when a device has the same ID as a cross-signing - key, it MUST check key IDs being verified in a consistent order: it must - check if the key ID matches a cross-signing key first, and if not, treat it - as a device ID. +3. Clients SHOULD also display a warning and MUST refuse to verify a user when + they detect that the user has a device with the same ID as a cross-signing key. A user's user-signing and self-signing keys are intended to be easily replaceable if they are compromised by re-issuing a new key signed by