Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MSC1796: improved e2e notifications #1796

Closed
wants to merge 6 commits into from
Closed

Conversation

ara4n
Copy link
Member

@ara4n ara4n commented Jan 11, 2019

@ara4n ara4n added proposal-in-review proposal A matrix spec change proposal labels Jan 11, 2019
@@ -0,0 +1,125 @@
# Proposal for improving notifications for E2E encrypted rooms
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

leaving this here so I don't forget later:

My overall concern with this proposal is that it proposes that notifications still be handled server-side. Given the direction of e2e and extensible events, I continue to be convinced that server-side unread/notification counts are not the right approach. Instead, clients should be responsible for tracking this information as they are the best part of the stack to determine what the numbers should be.

Doing client-side notifications/unread counts does mean that clients are more complicated and duplicating efforts, however the server cannot possibly be expected to be as reliable anymore. I think it's better worth our time making it easier for clients to calculate counts and set expectations for how they work rather than continue to try and keep this server-side.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

more complicated and duplicating effort

That's not really the point @ara4n is making though. The point is that in the best case it just chews bandwidth and CPU (and hence battery). In the worst case, it is imperfect (read: misses notifications!!) because of the need to resync potentially large amounts of data which isn't feasible to do currently. This seems like a good use case for the server to do this work to me. Yes, there are privacy concerns, but it opens no new security fronts given the amount of metadata already being passed through the server's hands in the clear.

Co-Authored-By: ara4n <matthew@arasphere.net>
@turt2live turt2live added the kind:feature MSC for not-core and not-maintenance stuff label Apr 20, 2020
@turt2live turt2live added the needs-implementation This MSC does not have a qualifying implementation for the SCT to review. The MSC cannot enter FCP. label Jun 8, 2021
@bradtgmurray
Copy link

Should this be closed in favour of #3952 ?

@turt2live
Copy link
Member

@ara4n I believe you mentioned somewhere that this should indeed be closed. If this is accurate, could it be closed please?

@richvdh
Copy link
Member

richvdh commented Mar 1, 2023

alternatively,

@mscbot fcp close

@mscbot
Copy link
Collaborator

mscbot commented Mar 1, 2023

Team member @richvdh has proposed to close this. The next step is review by the rest of the tagged people:

Once at least 75% of reviewers approve (and there are no outstanding concerns), this will enter its final comment period. If you spot a major issue that hasn't been raised at any point in this process, please speak up!

See this document for information about what commands tagged team members can give me.

@mscbot mscbot added proposed-final-comment-period Currently awaiting signoff of a majority of team members in order to enter the final comment period. disposition-close labels Mar 1, 2023
@mscbot
Copy link
Collaborator

mscbot commented Mar 14, 2023

🔔 This is now entering its final comment period, as per the review above. 🔔

@mscbot mscbot added final-comment-period This MSC has entered a final comment period in interest to approval, postpone, or delete in 5 days. and removed proposed-final-comment-period Currently awaiting signoff of a majority of team members in order to enter the final comment period. labels Mar 14, 2023
@olmari
Copy link

olmari commented Mar 17, 2023

While I am not to say moth foaming that is the approach best or not, I would want to point out, maybe in more general, that is the fact that "other meta already leaks information" the grounds to add another one? instead of thinking hot to make existing metadata leak less? :P

@turt2live
Copy link
Member

This MSC is set to be closed at the end of FCP, not merged, fwiw. We're of the opinion that #3952 (which respects metadata a bit more) is a better option.

@mscbot
Copy link
Collaborator

mscbot commented Mar 19, 2023

The final comment period, with a disposition to close, as per the review above, is now complete.

@mscbot mscbot closed this Mar 19, 2023
@mscbot mscbot added finished-final-comment-period and removed disposition-close final-comment-period This MSC has entered a final comment period in interest to approval, postpone, or delete in 5 days. labels Mar 19, 2023
@turt2live turt2live added rejected A proposal which has been rejected for inclusion in the spec and removed finished-final-comment-period labels Mar 19, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind:feature MSC for not-core and not-maintenance stuff needs-implementation This MSC does not have a qualifying implementation for the SCT to review. The MSC cannot enter FCP. proposal A matrix spec change proposal rejected A proposal which has been rejected for inclusion in the spec
Projects
Status: Done to some definition
Development

Successfully merging this pull request may close these issues.

8 participants