Quentin Gliech's Avatar

Quentin Gliech

@sandhose.fr

Software engineer working on auth at Element for @matrix.org

79
Followers
125
Following
11
Posts
23.12.2023
Joined
Posts Following

Latest posts by Quentin Gliech @sandhose.fr

Preview
Ready for The Matrix Conference 2025! We’re ready for The Matrix Conference 2025 - 300+ participants from 20+ countries and 10+ governments - all championing Matrix-based sovereign, secure and interoperable communications.

πŸš€ We’re ready for The Matrix Conference 2025 kicking off tomorrow in Strasbourg!

🌍 300+ participants from 20+ countries and 10+ governments - all championing Matrix-based sovereign, secure and interoperable communications. We’re proud to be the anchor sponsor again!

Highlights and detailsπŸ‘‡οΈ

14.10.2025 08:53 πŸ‘ 17 πŸ” 11 πŸ’¬ 0 πŸ“Œ 0

Having daily-driven the new UI for quite some time now, I had forgotten how much worse the old room list was. Such a nice revamp

23.09.2025 15:09 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

One trick which works on iOS: holding power+volume up or down for 1s will show the shutdown/SOS screen and disable FaceID/TouchID until you manually enter your passcode

21.09.2025 08:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

This is certainly one of the most intriguing mystery I’ve ever witnessed at $dayjob

25.07.2025 20:07 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
The importance of open standard federation for chat A genuine open standard is the single most important part of ensuring digitally sovereign communications between multiple separate organisations.

"An open standard is the key to digitally sovereign communications between multiple separate organisations.”

Matthew Hodgson presents with UNICC's Tima Soni at UN Open Source Week about the importance of open standard federation for real time communications.

element.io/blog/the-imp...

19.06.2025 09:54 πŸ‘ 17 πŸ” 9 πŸ’¬ 0 πŸ“Œ 0

Did Apple effectively broke the Sign-in with Apple OpenID Connect discovery document? appleid.apple.com/.well-known/... now advertises endpoints on account.apple.com; including the issuer. Looking at my Sentry errors, the switch happened ~2h ago?

11.06.2025 09:13 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Partial Keyframes β€’ Josh W. Comeau CSS Keyframe animations are so much more powerful than most developers realize. In this tutorial, I’ll show you something that completely blew my mind, a technique that makes our keyframe animations s...

I just published a new blog post about two of my absolute favourite CSS tricks. ✨

www.joshwcomeau.com/animation/pa...

10.06.2025 15:51 πŸ‘ 178 πŸ” 28 πŸ’¬ 12 πŸ“Œ 2
Preview
Moderated registration Β· Issue #3956 Β· element-hq/matrix-authentication-service Is your feature request related to a problem? Please describe. Currently running an open matrix server with "just" email and CAPTCHA still attracts a lot of spammers, as they can send messages into...

If this is important to you, could you please comment on this issue with how you’d expect it to work with your use case? It helps us prioritise stuff :)

github.com/element-hq/m...

14.05.2025 07:44 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

This is probably my biggest achievement working at Element :D
I worked for more than 4 years on next gen auth for Matrix and MAS πŸ™‚β€β†•οΈ

08.04.2025 15:33 πŸ‘ 9 πŸ” 5 πŸ’¬ 2 πŸ“Œ 0
Preview
US shows the risk of running a government by Signal The Trump administration’s spectacular security breach, in which it seemingly shared details of a planned military strike in Yemen with a journalist, highlights just what can go wrong if you use consu...

Welcome to the Wild West of consumer messaging apps within governments. It’s not a one off. It’s not just the Trump administration. Governments have to put a serious alternative in place, combining the usability and E2EE of messaging apps with enterprise-grade oversight and control.

25.03.2025 10:32 πŸ‘ 37 πŸ” 22 πŸ’¬ 2 πŸ“Œ 3
Preview
templates: replace tera with minijinja Β· matrix-org/matrix-authentication-service@995bdfc

I moved off tera for minijinja almost exactly a year ago, and every update confirms that it was the right thing to do. This project is really incredible!

10.11.2024 16:14 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

@bnewbold.net @divy.zone @mikestaub.social I've been reading your OAuth related proposal & it got me excited as you're trying to solve the exact same decentralised client metadata/registration problem I've been trying to solve for Matrix. I have a lot to say on it, I think we need to chat about this

08.02.2024 08:12 πŸ‘ 4 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

One really nice property of this is that the signed software statement can be statically embedded when you distribute your client. There is no secret key that may be extracted, and you can rely on redirect URIs being safe to avoid being impersonated

06.02.2024 22:43 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

And the self-signed software statement would include a cnf field as described in RFC 7800
Basically combining the software statement defined in RFC 7591, and use RFC 7800 for verifying the signature, as it is not defined in 7591
Then the server dedupes registration based on (cnf, software_id)

06.02.2024 22:35 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

I’ve been working on the same exact problems for Matrix, where we are currently moving toward OAuth/OIDC. Current plan to solve this is to rely on dynamic client reg, but with a self-signed software_statement, which is basically the client metadata in a JWT

06.02.2024 22:30 πŸ‘ 4 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0