I’m relatively new to using Matrix, so far I’ve given Element and Fluffy Chat a try. I’ve preferred Fluffy Chat so far, I dunno it kinda just seems more reliable and I like the mobile app, but I was wondering if there’s any others that are worth checking out. I mainly use Linux, Windows, and iOS.

  • @[email protected]
    link
    fedilink
    English
    12 days ago

    Matrix is a mossad-sponsored operation to get ahead of the curve in the technocrats pursuit of universal computer-encryption. The encryption it provides is worthless, as the current art of signals intelligence is not reliant on the content of the message but the metadata, of which Matrix has purposefully designed a system to be fully open to any technically-proficient inspector.

    It’s difficult to convey the subtlety of the deception here. “An open network for secure, decentralized communication.” This is a true statement. It’s in the surveillance community’s interest to deploy a form of encrypted communication that only they are efficient at exploiting. Computer networks are complicated, and there’s much that is not obvious because it’s software–something invisible to all users.

    Matrix is not a step in the right direction. The protocol (regardless of the state of encryption) is fundamentally flawed. Do not advocate its use. It’s a stalling tactic.

    Gnunet is a step in the right direction.

    • @scholar
      link
      22 days ago

      “the current art of signals intelligence is not reliant on the content of the message but the metadata”

      Because encryption works. The contents of a message is more valuable than the metadata.

      • @[email protected]
        link
        fedilink
        English
        42 days ago

        I’d say this: state’s aren’t looking for content. They’re looking for behavior. Social-graphs and related metadata is far more revealing than reading the contents of messages. For targeted espionage by human analysts matrix has a nice function to replicate database silently to a third-party (without the user’s knowledge). Though that’s not really needed (end-points are wide open and vulnerable), but it’s there as a core of the protocol.

        Again, encryption works at obfuscating the message. Mass surveillance at a state level doesn’t use the contents, but has developed other methods. The contents themselves are irrelevant. The man-power to create a surveillance regime on content makes it infeasible.