A compromised server could add the attacker as some form of ghost user in some channels, and have the legitimate users encrypt messages for an attacker-controlled public key.
We need to warm users, on each sent messages, if there is a new user involved in the list of recipients.
A compromised server could add the attacker as some form of ghost user in some channels, and have the legitimate users encrypt messages for an attacker-controlled public key.
We need to warm users, on each sent messages, if there is a new user involved in the list of recipients.