Ready for The Matrix Conference 2025!
Weβre ready for The Matrix Conference 2025 - 300+ participants from 20+ countries and 10+ governments - all championing Matrix-based sovereign, secure and interoperable communications.
π Weβre ready for The Matrix Conference 2025 kicking off tomorrow in Strasbourg!
π 300+ participants from 20+ countries and 10+ governments - all championing Matrix-based sovereign, secure and interoperable communications. Weβre proud to be the anchor sponsor again!
Highlights and detailsποΈ
14.10.2025 08:53
π 17
π 11
π¬ 0
π 0
Having daily-driven the new UI for quite some time now, I had forgotten how much worse the old room list was. Such a nice revamp
23.09.2025 15:09
π 1
π 0
π¬ 0
π 0
One trick which works on iOS: holding power+volume up or down for 1s will show the shutdown/SOS screen and disable FaceID/TouchID until you manually enter your passcode
21.09.2025 08:21
π 1
π 0
π¬ 0
π 0
This is certainly one of the most intriguing mystery Iβve ever witnessed at $dayjob
25.07.2025 20:07
π 2
π 0
π¬ 0
π 0
The importance of open standard federation for chat
A genuine open standard is the single most important part of ensuring digitally sovereign communications between multiple separate organisations.
"An open standard is the key to digitally sovereign communications between multiple separate organisations.β
Matthew Hodgson presents with UNICC's Tima Soni at UN Open Source Week about the importance of open standard federation for real time communications.
element.io/blog/the-imp...
19.06.2025 09:54
π 17
π 9
π¬ 0
π 0
Did Apple effectively broke the Sign-in with Apple OpenID Connect discovery document? appleid.apple.com/.well-known/... now advertises endpoints on account.apple.com; including the issuer. Looking at my Sentry errors, the switch happened ~2h ago?
11.06.2025 09:13
π 0
π 0
π¬ 0
π 0
This is probably my biggest achievement working at Element :D
I worked for more than 4 years on next gen auth for Matrix and MAS πββοΈ
08.04.2025 15:33
π 9
π 5
π¬ 2
π 0
US shows the risk of running a government by Signal
The Trump administrationβs spectacular security breach, in which it seemingly shared details of a planned military strike in Yemen with a journalist, highlights just what can go wrong if you use consu...
Welcome to the Wild West of consumer messaging apps within governments. Itβs not a one off. Itβs not just the Trump administration. Governments have to put a serious alternative in place, combining the usability and E2EE of messaging apps with enterprise-grade oversight and control.
25.03.2025 10:32
π 37
π 22
π¬ 2
π 3
templates: replace tera with minijinja Β· matrix-org/matrix-authentication-service@995bdfc
I moved off tera for minijinja almost exactly a year ago, and every update confirms that it was the right thing to do. This project is really incredible!
10.11.2024 16:14
π 1
π 0
π¬ 0
π 0
@bnewbold.net @divy.zone @mikestaub.social I've been reading your OAuth related proposal & it got me excited as you're trying to solve the exact same decentralised client metadata/registration problem I've been trying to solve for Matrix. I have a lot to say on it, I think we need to chat about this
08.02.2024 08:12
π 4
π 0
π¬ 0
π 0
One really nice property of this is that the signed software statement can be statically embedded when you distribute your client. There is no secret key that may be extracted, and you can rely on redirect URIs being safe to avoid being impersonated
06.02.2024 22:43
π 2
π 0
π¬ 0
π 0
And the self-signed software statement would include a cnf field as described in RFC 7800
Basically combining the software statement defined in RFC 7591, and use RFC 7800 for verifying the signature, as it is not defined in 7591
Then the server dedupes registration based on (cnf, software_id)
06.02.2024 22:35
π 2
π 0
π¬ 1
π 0
Iβve been working on the same exact problems for Matrix, where we are currently moving toward OAuth/OIDC. Current plan to solve this is to rely on dynamic client reg, but with a self-signed software_statement, which is basically the client metadata in a JWT
06.02.2024 22:30
π 4
π 0
π¬ 1
π 0