Can we get a better understanding of the root cause and blast radius?
You say, "if someone had conversation trimming on, it could create a rare situation where a database ID was re-used in a way that could result in this behavior."
Is this someone user A or user B? Where is this database and what is it storing? Are these images previously sent or received from either A or B, or are they possibly from some thread between users C and D? How does this agree with end-to-end encryption?
How can you expect people to use your product with a bug this severe and no analysis of the impact or a statement as to who might have been affected?
You say, "if someone had conversation trimming on, it could create a rare situation where a database ID was re-used in a way that could result in this behavior."
Is this someone user A or user B? Where is this database and what is it storing? Are these images previously sent or received from either A or B, or are they possibly from some thread between users C and D? How does this agree with end-to-end encryption?
How can you expect people to use your product with a bug this severe and no analysis of the impact or a statement as to who might have been affected?