193 points by LorenDB 1 day ago | 142 comments
jckahn 1 day ago
Matrix has been great for me and I recommend that everyone else use it!
foresto 1 day ago
They don't need a back door when they control the front door: the app. End-to-end encryption doesn't protect the endpoints.
(In other words, your concern is warranted.)
pentagrama 1 day ago
Even though they can't read your messages, they know who you talk to, how often, when, and for how long. They also track your device info, IP address (which can reveal your location), network details, and app usage patterns.
And this data isn’t just sitting there—Meta uses it. For example, if you chat with a business on WhatsApp, you might start seeing ads for that business on Instagram or Facebook. They don’t need to read your messages when they can infer so much just from how you use the app.
Disclaimer: Comment translated from Spanish and corrected by Chat GPT.
ItsBob 17 hours ago
I've long wondered if this is actually true.
If I have a closed-source app and claim (and can verify!) E2EE, surely I could still read every message from my closed-source app, within the app itself, and you'd never know.
I've never been a mobile app developer but I've been a desktop and web developer since the 90s so I don't know what apps can and cannot see but in a desktop app or web app, if it's on the screen, it's decrypted and I can put code in to read/steal it.
Am I missing something here?
floralhangnail 14 hours ago
robertlagrant 15 hours ago
I just don't know if that is actually true, or if meta doing e2ee and then pinging your messages around from the app after they're delivered is true. I've no reason to believe either is.
ranger_danger 1 day ago
foresto 1 day ago
(Arathorn: is e2ee metadata still on the roadmap?)
But no, not all your data is exposed. The e2ee parts, like message content in encrypted rooms, are opaque to Cloudflare.
Arathorn 1 day ago
Steltek 1 day ago
nisa 1 day ago
From the bridges I've run, only the Telegram bridge is somewhat stable for me but it also has it's warts.
Might be different if you run a strictly personal server for 1:1 conversations but I'd say from an ux perspective the bridges idea largely failed IMHO.
I don't think it's the fault of element/matrix it's a difficult problem and I guess with limited resources they made a lot of progress and made things possible that weren't before but it's not plug and play, at least it wasn't for me.
In general I've found it's also difficult to communicate in group chats if there are two worlds with a slightly different view (missing reactions, some elements of the messenger are not supported like captions, polls and so on...)
kuon 1 day ago
nisa 1 day ago
Didn't knew about this one. Thanks I'm looking into it!
jcul 1 day ago
The big downside for me is not being able to use it on two devices. All the other services, privacy concerns or not can now do this. It's one reason why I stopped donating to / advocating for signal.
nothrabannosir 1 day ago
https://support.signal.org/hc/en-us/articles/360007320551-Li...
jcul 22 hours ago
It doesn't allow you to use multiple phones at the same time.
kaiken1987 14 hours ago
nothrabannosir 11 hours ago
methuselah_in 8 hours ago
jokoon 1 day ago
This somehow causes a huge pain to connect to mozilla's matrix instance, and I never understood why. This is a bit ironic since firefox has that feature to clear cookies.
I had to reset password, and do other weird things, I can't remember what exactly.
I hope this MAS thing fixes it.
apples_oranges 1 day ago
jeroenhd 22 hours ago
If MAS fixes this, it'll be by accident and it'll probably break in the future. Firefox warns against this kind of breakage if you enable strict tracking protection in the settings. You can't have strict tracking protection + websites doing cross-domain authentication working.
anon7000 1 day ago
jokoon 1 day ago
I am not a web developer, but I would disagree with that.
Either web standards respect privacy or they don't, but I would not sacrifice privacy for anything.
Firefox was right to prevent tracking, it highlights how webstandards are just not good. I something doesn't work properly in a firefox private window, to me it should not exist.
dwattttt 1 day ago
johnmaguire 1 day ago
jeroenhd 22 hours ago
That's not something companies like Matrix can use. If you're installing software already, why not skip the browser engine and install a full Matrix client instead?
johnmaguire 13 hours ago
Privacy Pass is currently being standardized by the IETF, so we may see more widespread adoption eventually: https://privacypass.github.io/
dwattttt 8 hours ago
If a Privacy Pass token is needed for access to your email, then redeeming the token tells the service you (the client) can access your email. That's identified you.
kevin_thibedeau 1 day ago
Bubbling up these architectural details to the front end is a symptom of the webdev cargo cult coming up with broken ideas that get fossilized as the status quo.
johnmaguire 1 day ago
The alternative would be something where I enter my Google username/password on random websites, and trust that they will forward it to Google and not do anything nefarious. This is less secure and less private.
kibwen 1 day ago
wkat4242 1 day ago
It's also a bit disheartening to see Matrix putting all that "Log in with Google", Apple, Facebook etc so prominently on their login page. The whole idea of decentralised services was getting out of those walled gardens.
johnmaguire 1 day ago
cvwright 1 day ago
I struggle to see why I should trust it with those things but not the account password.
tcfhgj 20 hours ago
lucyjojo 23 hours ago
nurettin 1 day ago
https://www.mozilla.org/en-US/privacy/firefox/#bookmark-how-...
apetresc 1 day ago
Is that part of MAS? Was that initiative ever fully-baked? Or am I just misremembering?
Arathorn 1 day ago
So yes, fully-baked and part of Matrix since 1.0!
Next Gen Auth via OIDC is instead a key part of the (upcoming) Matrix 2.0 spec release - see https://areweoidcyet.com and https://github.com/matrix-org/matrix-spec-proposals/pull/386...
MartijnBraam 1 day ago
neilv 1 day ago
* Do all the Matrix clients need to be modified to support this authentication method?
Arathorn 1 day ago
MAS provides backwards compatibility for the old Matrix auth APIs for existing Matrix clients, so they do not need to be modified to keep working. However, to get the most out of all the new auth features (2FA, MFA, QR login etc. etc.) then clients will need to be upgraded to speak OIDC natively. Element X for instance is already OIDC-native.
https://areweoidcyet.com has more details.
cyberax 1 day ago
2. Yes.