openpgp4fpr:358e81f6a54dc11eaeb0af3faa742fdc5afe2a72
I run a complete, self-hosted Matrix stack including bridges to WhatsApp, Slack, Telegram and Signal as well as Element Call (Livekit) and MAS (the new authentication system).
I don’t think there’s any shortcuts. You just need to install them and work through any issues, one-by-one. Start with just the homeserver (Synapse, don’t bother with anything else yet) and add one component at a time and get it working before moving to the next.
I will say that having a decent knowledge of reverse proxies, networking, DNS and certificates will help you greatly. Having a solid understanding of Docker (if you’re using Docker) would be of great benefit too.
It should be much easier today than it was five/six-odd years ago when I started; things are more polished now than they were then.
twiiit.com will redirect you to a random Nitter instance. Sometimes the instance is blocked, sometimes the random instance works.
It’s slowly getting worse, as is Twitter X in general, but that’s X for you.
Each message in the various rooms are encrypted individually with their own keys. These keys are derived from the session keys of the participants in each of the rooms. That’s a lot of keys.
If you wish to read these encrypted messages across multiple devices you’ll need to have the same keys on each of those devices ("sessions ") too.
One method to share the keys is for your sessions to “gossip” them between each other.
When you logout of a session, all its keys are deleted.
If you ever logged out of all your sessions at once, you’d lose access to all those keys and you’d never be able to decrypt your old messages again.
To mitigate that, you can create a key backup that is itself encrypted and stored on the server (Secure Backup). This allows you to download the stored keys from the server, restore them to your current device and rejoin the discussions again.
The Cross Signing process is the process used to authorise your new session and allows it to participate in the key-gossip function. By restoring the keys from the Secure Backup you’re implicitly signing-in your device and blessing it all at once.
(… as far as I understand it all. Someone with more in-depth knowledge will correct me, I’m sure)
You 100% should.
I bought a second-hand Pixel, installed GrapheneOS the moment it arrived and never looked back.
I recently installed Curve for contactless NFC payments. Their support is terrible but, after some teething issues, it works without any problems.