• 15 Posts
  • 195 Comments
Joined 5 months ago
cake
Cake day: February 10th, 2024

help-circle








  • Edit replacing my original comment:

    Looks like that package has been replaced by org.gtk.Gtk3theme.Breeze. That’s what I’m using, and it is receiving updates.

    $ flatpak remote-info flathub org.gtk.Gtk3theme.Breeze-Dark
             ID: org.gtk.Gtk3theme.Breeze-Dark
            Ref: runtime/org.gtk.Gtk3theme.Breeze-Dark/x86_64/3.22
           Arch: x86_64
         Branch: 3.22
     Collection: org.flathub.Stable
       Download: 156.9 kB
      Installed: 386.6 kB
    
         Commit: 5a19b0c0808f82290d1f64c95d2406a860329817e0f269b4aaf0a1bbba92323a
         Parent: 390f820d32df2f22e3a3165eb4d65071dcb93a357ae7730f4ca548b5d016b966
    End-of-life: This theme has been replaced by org.gtk.Gtk3theme.Breeze, see README for workaround on using system color schemes. https://github.com/flathub/org.gtk.Gtk3theme.Breeze#workarounds
        Subject: Add EOL (fc4339ff)
           Date: 2022-02-22 00:21:51 +0000
    







  • Obviously you need someone joining the room for the room metadata to be shared between homeservers.

    Well then, your assertion that Matrix gives it freely is false.

    Not so with Matrix, where a joining homeserver get full retroactive access to all the room metadata since the room’s creation.

    This is false, too. Historical event visibility is controlled by a room setting. (And if you don’t trust admins of a sensitive room to configure for privacy, then you’re going to have bigger problems, no matter what platform it’s on.)

    you really need to stop privacy LARPing

    LARPing? I’m not the one stirring up drama with falsehoods and patronizing snark, am I? Farewell.


  • Matrix stores all this info and gives it freely to other servers retroactively(!)

    Can you show me the part of the spec that allows a server with no room members to get private room info from another server? I’m skeptical, but if true, I believe that would be worth reporting as a bug.

    network layer sniffing (which is anyway much harder to do)

    You’re funny.


  • The network layer of all internet servers reveals almost everything you listed. Signal has the same problem, and there’s nothing they can do about that. The only way to avoid it is to use a completely peer-to-peer model (Matrix has started work on this, btw) and avoid communicating across network routes that can be monitored.

    There might be one exception, depending on what you mean by “Accounts”: The user IDs participating in a room can be seen by server operators and room members. But then again, server operators can already see their users’ IP addresses (which is arguably more sensitive than a user ID), and I believe room members have to be allowed into the room in order to see them. For most of us, that’s fine. Far from a disaster.


  • Human behavior is funny, isn’t it? No matter what the topic, there are always people around who like to repeat criticism they heard from someone else, even if it’s so vague as to be useless (“metadata disaster”) or they don’t understand the details at all.

    It’s not a disaster. A few minor bits of metadata (avatars and reactions, IIRC) haven’t been moved into the encrypted part of the protocol yet. If that’s a problem for your use case, then you might want to choose a platform with different flaws, or simply avoid those features. It’s already good enough for the needs of many privacy-minded folks, though, and it continues to get better.