We're gearing up to implement all new UX for E2E encryption, including cross-signing (yay!!!), trust-on-first-use, E2E search, and then at last E2E-by-default! We're also making the leap to @[email protected] for our UI/UX work, which is proving incredibly fun :D Here's a sneak peek...
stretch-backports is based on buster, so it won't contain anything newer than what's in buster. And buster has 0.99.2 because that was the version that was available when buster froze. There is stretch-backports-sloppy, which (AIUI) can be updated with what's currently in testing, but I don't know if andrewsh (or anyone else) has plans do upload synapse there. It may be best to ask in #matrix-debian:matrix.org. Alternatively, use the packages from packages.matrix.org. ;)
An official report for the Dutch government concluded:
“(Microsoft Office) systematically collects data on a large scale ... covertly, without informing people. … Microsoft does not offer any choice with regard to the amount of data, or possibility to switch off the collection.”
Don't use Microsoft Office, use LibreOffice instead 👍
Not all end-to-end encrypted messaging is completely private.
One good way to ensure that you can trust your end-to-end encryption is to use an open protocol that allows you to use whatever client you want, which means that the system isn't controlled by just one entity.
Why do we care about encryption? Why was it a big deal, at least in theory, when Mark Zuckerberg announced earlier this year that Facebook would move to end-to-end encryption on all three of its messaging platforms? We don’t just support encryption for its own sake. We fight for it because...