
Chaos Computer Club - recent events feed
2,041 episodes — Page 16 of 41
FAIREDU (jh25)
Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
Abschlusspräsentation (jh25)
Projekte: FAIREDU, Bit-Flip, Simple Study, Flappy Rocket, News Map, Space Tree, Schüli Cloud, Lama Script, Daily Guide, Lautstärke messen (im Klassenzimmer), Partypaka Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://c3voc.de
Writing your own Go linter (dhcp25)
How does a (Go) linter work? We'll find out and write our own! A linter is an automated way of performing a code review. It automatically checks your code way faster than any human could do, and with way less environmental impact and more deterministically than an AI would use. Sure, it does not replace code review, but it allows the reviewer to focus on other things, that you don't have to mechanically check every time. If you are not using a linter in your CI pipeline, then you're wasting valuable engineering time. This talk will first dive into the details on how compiler parse the language and how the abstract syntax tree works. Then we'll take a look at Go owns analysis package and how we can use it to write our own linter, including a small example that you can use to get started writing linters. Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/QDX9T3/
Tappybara: Niemand hat die Absicht, Bargeld zu digitalisieren! (dhcp25)
At our Saarländisches Chaos-Event Mega-Knowledgecamp, we created an Innovative Digital Platform™ to have digital payments at the bar, without involving American payment acquirers and networks. This talk will present the many NFC crimes we committed to enable this. Let's admit it, dealing with cash at a bar, particularly notes with wet hands, is a bit of a faff. In September we held the first edition of the Saarland's first chaos event, Mega-Knowledgecamp. Obviously, we needed a bar, but we didn't want to be dealing with cash at the bar; neither did we want to be using the primarily American payment networks and acquirers for payments. As a solution to this dilemma, we decided to create our own payment system for the bar. Attendees could pre-book bar credit and pay via bank transfer, or hand over cash at the help desk. Payment could then be made at the bar using the ticket barcode, or using the digital wallet feature of Google phones over NFC - just like a bank card! This talk will cover how we built this system, how the NFC protocols of Google and Apple Wallet work, the insane level of NDAs required to implement this, and how you can use this yourself. Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/KUTQB3/
Creating a Gridfinity Chocolate Advent Calendar (dhcp25)
Normal Advent calendars are boring: so let’s make our own! We’ll combine all our favorite technologies: Gridfinity (for the grid system), 3D printing (for the grid), vacuum molding (for the chocolate), laser cutting (for the frame), and automated paper cutting to create advent calendars that are both beautiful and functional. Along the way, we’ll cover practical food safety considerations and show how these techniques come together to produce something tasty, nerdy, and gift-worthy. Join me in the creation of an advent calendar for the hackers and makers in your life. Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/8MZRMA/
Zelf hosten van je e-mail (dutch talk) (eth0_2025)
FooBar shows us how he self-hosts his e-mail, and how you can too. about this event: https://c3voc.de
The S-Bahn Mitteldeutschland and It's Consequences (dhcp25)
The many consequences of running your regional rail network like an S-Bahn A transgender catgirl who knows too many things about the MDSB network infodumps to a (not) captive audience about the many issues said network has caused for the transit of the region around Leipzig and Halle Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/HCTRKV/
HTTP.sh (eth0_2025)
Domi shows off the internals of a HTTP framework written in bash. Slides: https://md.sakamoto.pl/p/N2TdJQP7G#/ about this event: https://c3voc.de
BGP for fun and profit (eth0_2025)
Everyone knows that BGP is used for public internet routing, but it has more tricks up its sleeve than that. r3boot takes us along. about this event: https://c3voc.de
A short Introduction to ROS 2 (chaosdorf)
This talk by strifel will contain a short introduction to the "Robot Operating System" (2!) and what it supports. about this event: https://c3voc.de
Model kits and you! (chaosdorf)
a small talk about getting started with the hobby of model kits! about this event: https://c3voc.de
Computer im Hackspace – das macht doch nix (chaosdorf)
2025 might be the year of Linux on the desktop at Chaosdorf: ytvwld is trying to reinstall the public Windows laptops with NixOS, Plasma and lightdm. He explains why UX design is hard and why systemd is important. about this event: https://c3voc.de
Reverse engineering for fun and profit! (chaosdorf)
I tried reverse engineering a plugin for davinci resolve because I am not rich, can't buy it as a tax write-off and wanted a challenge. I do not endorse bypassing DRM illegally … heh about this event: https://c3voc.de
Segeln für Nerds: Aero- und Hydrodynamik am Schiff (dhcp25)
Wir verschaffen uns einen Überblick über die physikalischen Effekte in Aero- und Hydrodynamik, die dafür sorgen, dass Segelschiffe schwimmen, vorwärts fahren und nicht umkippen. Danach wagen wir noch einen Blick darauf, was zusätzlich im Wasser passiert, wenn große Schiffe in engen Kanälen, Hafenbecken und rückwärts unter Motor manövrieren. <br> grober Inhaltsplan <br> <li> statischer und dynamischer Auftrieb, Verdrängung und Lateralplan <li> Kräfte- und Momentengleichgewichte <li> Segel- und Lateraldruckpunkte, Luv- und Leegierigkeit <li> Aufrichtende Momente, Stabilitätskurven, Kenterwinkel <li> Tragflächenströmungen, Reynoldszahl und Wirbel, Kurse zum Wind <li> Bugwellen und Wulstbug, Rumpfgeschwindigkeiten <li> Bank- und Squat-Effekte, Bernoulli-Theorem <li> Radeffekt bei Rückwärtsfahrt unter Motor <li> Zusätzliche Leinenkräfte im Hafen, Anlegen und Ablegen Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/B7LJ7G/
Speed Puzzlen – Die Ordnung im Chaos (dhcp25)
Eine kurze Einführung in die Kunst des Speed Puzzlen und die Community. Auch Puzzlen kann spannend sein! Ich erzähle euch etwas über das Konzept des Speed Puzzlen, die möglichen Strategien und die Community dahinter. Ausserdem werde ich einige Puzzles mitbringen, falls danach gepuzzelt werden will. Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/NAQPAZ/
Opening (dhcp25)
sudo systemctl start [email protected] Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://talks.dhcp.cfhn.it/dhcp25/talk/K97WMF/
Palantir, Dark Enlightenment und die deutsche Polizei (oc)
Das Pentagon findet es gut, die Migrationsbehörde ICE findet es gut, Banken und Wirtschaft finden es gut, Sauron findet es sehr gut und da überrascht es nicht, dass die deutschen Sicherheitsbehörden es auch gut finden: Die Überwachungssoftware Palantir Momentan ist die amerikanische Überwachungssoftware Palantir in aller Munde. Nicht nur, weil die deutsche Polizei es in den Bundesländern Bayern, Hessen und Nordrhein-Westfalen bereits verwendet und der deutsche Innenminister die Nutzung gerne bundesweit ausweiten würde; nicht nur, weil die Behörden sich damit in sicherheitsrelevanten Vorgängen im Inneren von einem ausländischen Softwarekonzern abhängig machen, dessen Kunden einer Blackbox sie damit sind; sondern auch, weil die Gründer der Firma Palantir in den USA eine reaktionäre rechte Politik verfolgen, deren Ziele durch die Anwendung der Software Palantir, etwa bei der Verfolgung von Migranten durch die Migrationsbehörde ICE, konkret mit umgesetzt werden. Seit dem Beginn der zweiten Amtszeit des US Präsidenten Donald Trump findet eine Umwälzung der politischen und institutionellen Landschaft in den USA statt. Was mit Elon Musks Department of Government Efficiency (DOGE) und dem Rauswurf vieler Staatsbeamter begann, wurde mit der öffentlichen Verfolgung von Menschen und dem Einsatz von Militär im Inland fortgesetzt. Diese Entwicklungen passen auffällig gut zu den Vorstellungen des Dark Enlightenment, dessen Vordenker Curtis Yarvin den Palantir Gründer Peter Thiel persönlich gecoached hat. Zu den weiteren Anhängern von Curtis Yarvins Denken gehört der US Vizepräsident JD Vance, ein ehemaliger Angestellter von Peter Thiel und dessen Protegé. Zudem war es Thiel, der bereits 2016 die CEOs von Amazon, Microsoft, Facebook, Google und Apple und Elon Musk im Trump Tower zusammengebracht hat. Könnten die Entwicklungen in den USA auf Thiels beharrliches Wirken – konservative (rechtsextreme) Ideen mit bestimmten Personen in Machtstellungen zusammenzubringen – zurückzuführen sein? Anhand des Werdegangs von Peter Thiel wird der Vortrag entdecken, um was für Figuren es sich bei Peter Thiel und seinem Netzwerk handelt und welchen Einfluss es mittlerweile entwickelt hat und von welcher Ideologie es angetrieben wird. Es wird sich zeigen, dass es Thiel im Eigentlichen nicht um die deutsche Polizei oder um das Abschieben von Migranten geht, sondern darum dass der Menschheit eine große Prüfung bevorsteht: die Wahl zwischen dem Armageddon, dem Antichrist oder Thiel und seiner PayPal Mafia, die uns mit Palantir vor dem Untergang bewahren. Am Ende werden wir uns entscheiden müssen. Was das dann bedeutet könnt ihr hier sehen (Teil 2): https://media.ccc.de/v/c4.openchaos.2025.11.autoritaere-high-tech-komplex-unterwanderung-der-demokratie Das im Vortrag erwähnte Zusatzmaterial ist hier verfügbar: https://koeln.ccc.de/html/oc_palantir/ Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://c3voc.de
Variational Autoencorders: the cognitive scientist's favorite deep learning tool (realraum)
Variational Autoencoders (VAEs) were first introduced as early concept learners in the vision domain. Since then, they have become a staple tool in generative modeling, representation learning, and unsupervised learning more broadly. Their use as analogues of human cognition is one of the first steps towards the understanding of more complex cognitive models leading up to models of human brain function and behavior. As part of a series of talks on cognitive science and deep learning at the realraum in Graz, this presentation will focus on the role of VAEs in cognitive science research. Topics: - Supervised vs. unsupervised learning - Deep Learning basics: classifiers and backpropagation - Autoencoders: architecture, training, embedding, and generative modeling - Variational Autoencoders: statistical latent space, and the reparametrization trick - Training VAEs: loss functions, optimization, and the KL divergence - Concept learning: VAEs in cognitive science https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.realraum.at/realraum-october/talk/LHH3M9/
Gute Sache, falsche Plattform? NGO im Dilemma der sozialen Medien (dgna)
Social Media geniesst keinen guten Ruf. Reisserische Posts erhalten mehr Reichweite als fundierte Meinungen, polarisierende Inhalte werden gefördert und die Macht darüber, was wir zu sehen bekommen, liegt in den Händen von Tech-Milliardären. Dennoch ist es für Vereine und Organisationen fast unmöglich, ihre Community zu pflegen und ihre Botschaften zu verbreiten, ohne auf Social Media präsent zu sein. Doch wie macht man das, ohne seine eigenen ethischen Grundwerte zu verraten? Und bräuchte es mehr Leitplanken für Plattformen oder deren Nutzer:innen? Am Netzpolitischen Abend vom Donnerstag, 23. Oktober 2025 diskutieren wir diese Fragen im Lichtspiel in Bern. Als Gäste eingeladen sind Sophie Fürst, Geschäftsleiterin und Campagnerin bei der Stiftung für direkte Demokratie, Alessandro Iacono, Digital-Campagner bei digital/organizing sowie die Co-Geschäftsleitung der Digitalen Gesellschaft, Rahel Estermann und Erik Schönenberger. about this event: https://www.digitale-gesellschaft.ch/event/netzpolitischer-abend-zu-social-media/
Closing (matrix-conf-2025)
See you next year! Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/KAB39N/
Holding the Fort: How did bridges happen (matrix-conf-2025)
Take a trip back through time with me as we learn about how bridges happened. Why did we do it at all? Whose idea was it to hook up the then fledgling matrix.org network to the biggest IRC network? How many databases were shredded in the line of duty? This talk features a journey back through time as we look at bridges and integrations that have been built on Matrix over the years, and what we can hope to learn from it. There will be laughter, there will be eyebrows raised, there will be content involving the infamous IRC bridges and there may be a tear or two. There is plenty to dig into here as we go behind the scenes on what it takes to maintain a bridge for the global Matrix community, as well as how the standards of appservices have evolved over the years Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/D83FKE/
Leading the way into CRA compliance: Element’s approach to the incoming regulation (matrix-conf-2025)
The Cyber Resilience Act is a new European regulation that has the main goal to increase European cyber security and resilience, through accountability. A lot has been said about the impacts of the CRA on open source, in particular towards non-profit foundations, but what about organisations - such as Element - that operate complex licensing models with a mix of monetised and non-monetised products? In this talk we endeavour to shine a light on our thinking regarding CRA compliance for our products, as well as implications for the wider ecosystem of vendors and communities building on Matrix. We also introduce our roadmap of communications around the CRA, aimed at those using and building on top of our products. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/AS8JHQ/
How do messaging app users feel about untraceability? (matrix-conf-2025)
Messaging platforms offer to protect user privacy via a variety of features, such as disappearing messages, password-protected chats, and end-to-end encryption (E2EE), which primarily protect message contents. Beyond such features, "untraceable communication" tools for instant messaging protect users from network attackers observing transport layer metadata, which can reveal who communicates with whom, when, and how often. However, unlike E2EE, the effectiveness of these tools depends on large anonymity sets, making widespread user adoption critical. This talk presents a research study with 189 users of messaging apps about their perceptions of "untraceability" as a concept, as well as their opinions on the widespread availability of tools for untraceability. The study explores their perceptions of "untraceability'' from a broad conceptual standpoint; rather than focusing on a particular tool or implementation, we analyze how users reason about what features should be incorporated by two fictitious messaging platforms, Texty and Chatty, to prevent third parties from "knowing who communicates with whom". The results point to a critical gap between how users and privacy experts understand untraceability, as well as tensions between users that see untraceability as a protection to individual privacy and users that see it as a threat to online safety and criminal accountability. Beyond untraceability, I discuss how this research is relevant to the design of messaging platforms that promote privacy as a central value. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/DDKP3V/
Getting started with Element Server Suite Community (matrix-conf-2025)
Join us for an introduction to the Element Server Suite Community, the simplest way to deploy a Kubernetes-based Matrix 2.0-ready stack, maintained by Element. This workshop will deploy all the components of the suite: a Synapse homeserver with Matrix Authentication Service enabled, a Matrix RTC backend for calls, and an Element web client. You'll be able to try it on your local laptop using your Docker daemon, or deploy it on a virtual machine with a single-node Kubernetes setup. Whether you're new to Kubernetes and Matrix or looking to expand your server capabilities, this session will give you the foundation to get started and experience the latest Matrix features on your own machine. This workshop introduces you to the Element Server Suite (ESS), a streamlined and user-friendly way to deploy a Kubernetes-based Matrix 2.0-ready stack. No prior Kubernetes experience is required ! The suite is designed to be simple and accessible for both beginners and experienced users. During the session, you’ll walk through a hands-on deployment using one of three options: - your own Kubernetes cluster - a virtual machine with a single-node k3s cluster - or your laptop running KinD (Kubernetes in Docker). You’ll gain insight into the architecture of the suite, learn how to set up a self-hosted Matrix server, and explore how ESS can be customized to meet the needs of your community. By the end, you'll have a working Matrix 2.0 environment with a Synapse homeserver, Matrix Authentication Service, RTC backend, and Element web client - all ready to use! Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/8N8HZS/
A Contextual Integrity approach to privacy in interoperable messaging (matrix-conf-2025)
This talk will introduce the Helen Nissenbaum's theory of Contextual Integrity as a framework for understanding privacy in messaging platforms. Contextual Integrity views privacy not as keeping information secret, but as making sure information flows in ways that match people’s expectations in a given context, or in other words, what feels appropriate to share, with whom, and for what purpose. For example, if Alice shares her live location with Bob through a messaging app, she likely expects the app to use her location only to deliver it to Bob. But if the app also uses her location to target ads, she may feel that her privacy was breached. The problem isn’t that the location was shared, but that it was shared in a way that didn’t match the context or her understanding of how the information would be used. I will explain the theoretical framework with examples of how it can be adapted to identify and explain privacy expectations of particular messaging features, and discuss how it can be applied to interoperable messaging to identify potential privacy concerns. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/PEJYHG/
Scaling Real-Time in NeoBoard: Our Journey from P2P to MatrixRTC + LiveKit (matrix-conf-2025)
[NeoBoard](https://neoboard.io/) is an open source real-time collaborative whiteboard built on the Matrix protocol. It functions both as a widget within chat-focused Matrix clients like Element Web, and as a standalone web app that acts as a lightweight, whiteboard-centric Matrix client In this talk, we’ll share how we migrated NeoBoard’s real-time collaboration feature from a peer-to-peer WebRTC implementation to MatrixRTC with a LiveKit backend, a shift that was key to scaling to hundreds of concurrent users. We’ll cover the challenges we faced, the lessons we learned, and the architectural decisions that made the transition smooth. We’ll also touch on what’s still missing and what’s next for both NeoBoard and MatrixRTC. NeoBoard’s use of the Matrix protocol provides a replicated data store for CRDT-based events exchanged between all users collaborating in a whiteboard session. These custom events encapsulate shape and drawing data and are shared via the room timeline, enabling clients to reconstruct a consistent, persistent view of the board over time, even across network disconnections or when joining later. However, while this model ensures eventual consistency, it falls short for real-time interactions that require low-latency feedback, such as live cursor movement or simultaneous drawing. For these use cases, a dedicated real-time transport layer is essential. Using WebRTC, we initially added a real-time layer to NeoBoard that enabled low-latency peer-to-peer communication between users. However, this relied on a full-mesh topology, where each client maintains direct data channels with every other participant. This architecture quickly becomes unsustainable as the number of users grows, due to quadratic bandwidth and connection overhead. Additionally, WebRTC depends on ICE negotiation using STUN and TURN servers to establish connectivity across NATs and firewalls, which is often unreliable and can introduce additional latency and server load. The resulting variability in connection quality and resource usage made it difficult to deliver a consistent experience at scale. Given the success of Element Call's adoption of MatrixRTC and LiveKit, we decided to move forward with an alternative real-time data layer based on these technologies that, given enough backend resources, can scale indefinitely. In this talk, we’ll cover: - The architecture and design of NeoBoard’s real-time layer - An overview of relevant MatrixRTC spec proposals and their role in our migration - Implementing MatrixRTC with a LiveKit backend, including: - Session membership management - RTC focus handling - Infrastructure considerations and requirements - Live demo - Key challenges and what’s next Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/TM3ASG/
Integrating Matrix in a trustworthy collaborative ecosystem (matrix-conf-2025)
At Oodrive, our mission is to offer a secure and sovereign solution to manage our partners' most sensitive data. Building on this foundation, we are developing a secure collaboration platform that fully aligns with these values. Collaboration cannot happen without communication, therefore we decided to integrate a secure chat in our product. We chose the Matrix protocol to achieve that goal. Now that a first version is out and available to our partners, we want to share with the community how we integrated matrix in our product, and the challenges we overcame. Namely : - How we provision user accounts in our matrix instance. - How users authenticate transparently in the chat. - Make a demonstration to illustrate the seamless integration Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/A9YW3B/
Portable identites (MSC 2787) and the GDPR right to rectification, a pressing need for server operators (matrix-conf-2025)
Most of the discussions around privacy laws have been focused on the protection of data and condition of processing. But some others rights are starting to be litigated more widley and will soon play a bigger role for IT systems managers. This talk will focus on the GDPR article 16 (right to rectification), and how the current Matrix spec is inadequate for servers operators aiming to let people change their username, since MXID can't be changed (as of this proposal writing in June 2025). Based on the ongoing work done by the [Fedora community](https://fedoraproject.org/) on the [Fedora Username Change project](https://communityblog.fedoraproject.org/call-for-volunteers-regarding-the-fedora-username-change-project/), on recent legal cases in Europe, we will see why the adoption of [MSC 2787 (Portable identites)](https://github.com/matrix-org/matrix-spec-proposals/pull/2787) should be more than a nice to have, and how it intersect with questions of privacy and anti-discrimination. The talk will also touch on the topic of SSO configuration and downstream consumers best practice to deal with such changes. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/PTAPZE/
Solving the Fork Dilemma: How We Built a Maintainable Matrix Messenger (matrix-conf-2025)
Tammy is a multiplatform Matrix Messenger designed to be redefined by you. Want a different room list layout? Need a messaging interface tailored to a specific use case? Tammy’s extensible architecture makes that not only possible - but easy. In this talk, we’ll showcase how Tammy empowers developers to create radically customized Matrix experiences through its extension system. We’ll walk you through how we’re using Tammy to build Timmy, a TI-Messenger variant tailored for a very specific user group, with a completely different look and feel - all without forking or rewriting the core client. Expect a live demo, some under-the-hood insights, and a glimpse into the roadmap: spaces, audio/video, Matrix 2.0 and more. Whether you want a more focused UI, a minimalist mobile mode, or something wildly experimental, Tammy gives you the tools to build it. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/3YMJFP/
Building Matrix-Powered Campus Communication Platform Thousands Students (matrix-conf-2025)
In this talk I will present my journey in developing a decentralized and secure communication platform for a university with thousands students and faculty members. Using Matrix and Element as foundation I tailored the solution to meet academic needs, ensure data privacy and integrate with some systems, bots, widgets etc. The session will cover: - Why Matrix was chosen over other platforms. - Technical stack and deployment model. - Customization of Element and federation decisions. - Challenges (including authentication, onboarding, moderation and compliance). - Real-world impact and feedback. - Future plans including bridging, widgets and improvements. This case study shows how Matrix can empower large academic communities and help other institutions explore privacy-respecting and scalable alternatives to traditional messaging platforms. By the way, it is real story. :) Universities face growing challenges in balancing seamless communication, data privacy and platform sovereignty. This talk presents the story of how I built a Matrix-powered communication platform based on Element for a university community with thousands students, faculty and staff. I will share my hands-on experience deploying a self-hosted Matrix homeserver, using the Element client for academic use and integrating the system with some infrastructure. You'll learn about: - The decision-making process: Why Matrix and Element? - Technical architecture and deployment at scale. - Real-world challenges in onboarding, federation, moderation and support. - Custom feature additions and user adoption results. - Lessons learned and recommendations for other institutions or organizations considering Matrix. This session is ideal for technologists, sysadmins, public sector decision-makers and open-source advocates exploring decentralized alternatives to Slack, Teams or WhatsApp in education or large organizations. So yep, feel free to ask! Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/MLHCY7/
Schulchat RLP as [matrix]-based school messenger (matrix-conf-2025)
fairkom has developed a [matrix]-based school messenger for the Department of Education of the German state of Rhineland-Palatinate to serve up to half a million users. Schulchat RLP has one code base for all platforms and is available as app on Apple and Google Play Stores. What makes this solution unique is the deep integration of the identity and user management system from the "Bildungsportal RLP", ensuring seamless use for teachers, students, and even parents - from primary to vocational schools. For Schulchat RLP we have added a sophisticated address book into the messenger with role based communication templates and adapted the client application, based on FluffyChat, to meet pedagogical requirements, such as enabling active read confirmations. We will be presenting the project lifecycle, challenges with E2EE, SSO, hosting and how we manage user feedback and daily operations. fairkom is a silver member of the [matrix] foundation and offers custom messaging solutions and scalable hosting. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/QTBJP3/
Closing - Day 2 (sps25)
A thank you from the organisers. We hope you enjoyed your day! about this event: https://talks.python-summit.ch/sps25/talk/QW7U3F/
Lightning Talks - Day 2 (sps25)
Our Lightning Talks are open to everyone 😊 about this event: https://talks.python-summit.ch/sps25/talk/VG8HT8/
What Networks tell us about Trades, Power, and the World? (sps25)
Networks are all around us, shaping phenomena like epidemics, communication, and transportation. In this talk, we will explore how real-world problems can be analyzed and solved using graph-based methods and simple algorithms. Drawing from examples such as trade networks, corporate structures, and historical data, I will demonstrate how network analysis reveals insights that would otherwise remain hidden. Using NetworKit (and NetworkX), we will analyze real-world datasets to answer questions like: What does the core-periphery model reveal about trade networks? Could we have predicted that Moscow will become Russia's capital? How do corporate hierarchies differ from interaction hierarchies within organizations? Throughout the talk, I will introduce key concepts in network analysis and showcase Python as a tool for research. Attendees will have access to all datasets and code, enabling them to replicate the analyses and apply these techniques to their own projects. This session is designed for Python enthusiasts with an interest in data science, networks, and/or applied research. about this event: https://talks.python-summit.ch/sps25/talk/GZHTJX/
Gompertz Linear Units (GoLU) (sps25)
Activation functions are fundamental elements of deep learning architectures as they significantly influence training dynamics. ReLU, while widely used, is prone to the dying neuron problem, which has been mitigated by variants such as LeakyReLU, PReLU, and ELU that better handle negative neuron outputs. Recently, self-gated activations like GELU and Swish have emerged as state-of-the-art alternatives, leveraging their smoothness to ensure stable gradient flow and prevent neuron inactivity. In this work, we introduce the Gompertz Linear Unit (GoLU), a novel self-gated activation function defined as `GoLU(x) = x Gompertz(x)`, where `Gompertz(x) = exp(−exp(−x))`. The GoLU activation leverages the asymmetry in the Gompertz function to reduce variance in the latent space more effectively compared to GELU and Swish, while preserving robust gradient flow. Extensive experiments across diverse tasks, including Image Classification, Language Modeling, Semantic Segmentation, Object Detection, Instance Segmentation, and Diffusion, highlight GoLU's superior performance relative to state-of-the-art activation functions, establishing GoLU as a robust alternative to existing activation functions. about this event: https://talks.python-summit.ch/sps25/talk/PNL9LP/
Supporting TF-X with Matrix: best practices and pitfalls (matrix-conf-2025)
NATO organised a TaskForce-X Baltics event where we very quickly contracted, deployed and integrated telemetry and video streams from uncrewed platforms. This required a lot of coordination and this was done through our on-prem Matrix capability. I would like to share my experience by using Matrix to support this very demanding operational project. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/7ZXT8V/
The Role of the Matrix Protocol within Germany’s Sovereign and Secure Health Messenger Solution – A Loyal Player Embracing the Evolution of Secure Architectures (matrix-conf-2025)
Germany’s digital health infrastructure has long been built on the principles of sovereignty, open standards, and interoperability. With the electronic patient record (ePA) and KIM for secure data and document exchange, Germany established a federated ecosystem using standards such as FHIR and OIDC with sectoral identity providers. The recent introduction of the TI-Messenger (TIM) extends this ecosystem to real-time communication — now connecting over 25 million insured citizens through the RISE TI-Messenger, directly integrated into their ePA app (ePA FdV). Matrix serves here not as the foundation of sovereignty, but as a loyal enabler within an existing sovereign architecture. Operating own Matrix instances (e.g. via the RISE Cloud) ensures data locality and governance under German regulatory control, while federation allows secure inter-institutional communication. This approach balances federated flexibility and controlled trust domains, distinguishing Germany’s model from purely centralized or global platform solutions. The talk discusses the integration of Matrix within the sovereign health stack — ePA, sIDP, KIM, TIM, and OIDC — and explores risks and resilience in large-scale federation. It illustrates how Germany’s health communication layer evolves from document exchange to conversational care, preserving sovereignty while embracing interoperable, open technologies. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/CJSBUZ/
The Matrix SDK No One Talks About (matrix-conf-2025)
Trixnity is rapidly emerging as a powerful, flexible, and fully asynchronous SDK for building Matrix applications using Kotlin Multiplatform. What many don't realize: Trixnity is already in widespread use - potentially powering apps usable by over 50 million people. It’s embedded in multiple Matrix-based messengers, though you’d only know it by digging into app license disclosures. This talk shines a light on Trixnity’s hidden but significant role in the Matrix ecosystem and why more developers should pay attention. This session also presents the current state of Trixnity in 2025, highlighting key milestones, recent developments, and its growing adoption in real-world applications. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/BCLRR3/
Anonymization of sensitive information in financial documents (sps25)
Data is the fossil fuel of the machine learning world, essential for developing high quality models but in limited supply. Yet institutions handling sensitive documents — such as financial, medical, or legal records often cannot fully leverage their own data due to stringent privacy, compliance, and security requirements, making training high quality models difficult. A promising solution is to replace the personally identifiable information (PII) with realistic synthetic stand-ins, whilst leaving the rest of the document in tact. In this talk, we will discuss the use of open source tools and models that can be self hosted to anonymize documents. We will go over the various approaches for Named Entity Recognition (NER) to identify sensitive entities and the use of diffusion models to inpaint anonymized content. about this event: https://talks.python-summit.ch/sps25/talk/EWMBRM/
Element X and Pro Updates (matrix-conf-2025)
We will provide you with the latest updates on Element X mobile apps, as well the plan to sunset our classic Element apps. This includes both the current state, as well as a look into what to expect during the next couple of months and details about specific features like threads and spaces that many people are looking forward to on Element X. In the second part we’ll cover the intent and purpose behind the Element Pro apps - who are these for and why, and as part of it, look into how we’re allowing our customers to publish self-branded apps for a complete sovereign messaging solution. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/W9LUVA/
Why do I have 2 passwords? How to talk about encryption in Matrix (matrix-conf-2025)
Most modern software applications give total trust to the service provider. End-to-end encrypted (E2EE) services are different: the service provider is a gateway, and the real trust is with other people. This is unfamiliar, and can make using E2EE confusing. When you add in federation (meaning lots of different service providers) and a diverse set of client apps, trying to make Matrix's encryption understandable is tricky. It would help to have a shared set of words and definitions. In this talk I describe MSC4161, which attempts to establish a shared vocabulary, and then my own thoughts about some metaphors we can use to make these ideas easier to grasp. End-to-end encryption (E2EE) is unfamiliar to people used to using modern applications: instead of handing over total trust to the server you connect to, E2EE makes the server a simple connector, and we only have to trust the people we are actually talking to. It is quite common for people using Matrix to ask "Why do I have 2 passwords?", referring to the username and password for logging in, and the recovery key. I recently made a leap of understanding about this question: the reason is that there are two audiences: the password is for your homeserver, and the recovery key is for allowing you to talk to other people. I began working on MSC4161 ("Crypto terminology for non-technical users") because I believed we needed to standardise our vocabulary, but it quickly became clear that we need to do more than that: if we want to make Matrix easy to use, we need to agree on: - what the main ideas are, - what words we use to describe them, and - what metaphors we use to explain. In its current form, the MSC focusses on the first two. In this talk, I will summarise the ideas and words that are reasonably settled in the MSC and will hopefully make their way into the spec, and I will also introduce some ideas I have about the third item: how to explain Matrix's E2EE using some metaphors that are intended to find the right level of explanation, and be more accurate than the metaphors we have used up to now. We will go through the proposed common words: - Devices/sessions and Identity - Verified users - Message keys, message history and key storage - Recovery and recovery keys Then we will look at some proposed metaphors: - "connect" for logging in, - "id card" for identity, and - "safe deposit box" for recovery I will try to argue that these metaphors are at the right level of explanation, and they match more closely to what is really happening than the ideas we have used up to now. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/7LNZZ3/
MatrixRTC - The key sharing problem (matrix-conf-2025)
Why is having large encrypted group calls difficult? How do other providers solve this? The future? Demos! Why are large encrypted group calls difficult to host? Specifically, we will go into the details about key sharing, how we can use some tricks to optimize it and how they are also a very big footgun. We will also see how other providers like jitsi, zoom, discord and cloudflare handle this. And then show off the new Famedly Call project! There will also be some mentions of MLS and how it fixes this problem and some caveats, therefore attending one of the MLS talks from before is recommended :D Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/QCYBMC/
Secure and Sovereign communications for United Nations International Computing Centre and its Partners (matrix-conf-2025)
Secure communication leveraging the Matrix protocol for UNICC and its partners Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/WM9WAE/
Agentic Cyber Defense with External Threat Intelligence (sps25)
This talk will detail how to integrate external threat intelligence data into an autonomous agentic AI system for proactive cybersecurity. Using real world datasets—including open-source threat feeds, security logs, or OSINT—you will learn how to build a data ingestion pipeline, train models with Python, and deploy agents that autonomously detect and mitigate cyber threats. This case study will provide practical insights into data preprocessing, feature engineering, and the challenges of adversarial conditions. about this event: https://talks.python-summit.ch/sps25/talk/QNWFTD/
MatrixRTC (matrix-conf-2025)
In this talk, we will share the newest improvements to MatrixRTC. We'll focus on how the security and encryption architecture has evolved to provide robust, private communications for Matrix users. Additionally, we will show how to integrate Element Call into clients using the Rust or JS-SDK in a matter of minutes. Whether you're building a custom Matrix client or want to know what makes MatrixRTC such a great solution for secure communication, you'll walk away with practical knowledge to bring encrypted calling capabilities to your users and an in-depth understanding about the key distribution for real- time (MatrixRTC) sessions. In this talk, we'll explore the evolving landscape of MatrixRTC, the real-time communication layer of the Matrix protocol, and highlight key advancements. This year we saw a lot of advancements for MatrixRTC. To make it thorugh the spec review process we gathered feedback and added a couple of our own topics that we really wanted to improve. The changes might seem very small but have a very big impact in how good it fits into the matrix eco system. To name one of the highlights: A matrixRTC session can now be dirstirbuted over multiple SFU servers! On top of that a new matrix primitive will be introduced that greatly helps MatrixRTC and is useful in other parts of the ecosystem. With the spec proposals being as polished as never before and the first reviews from SCT members, there is no better time to accelerate the adoption of MatrixRTC-based calls. With Element Call, we went the extra mile to make this adoption as easy as possible. Element Call, being a widget, is available to the broader ecosystem and can be used as a shortcut to make clients compatible with MatrixRTC calls without much development effort. We would like to show how easy it is to implement Element Call into any JS-SDK or Rust SDK backed client (any client supporting the widget API). At the end of the talk, we will have a live demonstration of a call with a client that did not previously support MatrixRTC-based VoIP. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/UQVVRV/
Matrix French gov deployment: opening a private federation securely (matrix-conf-2025)
The French government has deployed a private Matrix federation for French civil servants called Tchap. Currently this federation has about 300 000 monthly active users and its usage is growing constantly. Today our federation is closed and we would like to be able to connect with other public French Matrix nodes (local authorities for instance), and also other European countries. We should implement measures to ensure that the federation remains resilient against potential attacks, both technical (e.g., DDoS, data interception) and organizational (e.g., unauthorized access, insider threats) : - How can we restrict the servers we wish to communicate with? How can we be sure that we are actually communicating with them? Since TLS can be vulnerable to man-in-the-middle attacks by state actors, we can't rely on it entirely. - How can we trust the identities of users from external deployments that we don’t control? - How can we limit the interactions that external users can have with users from our federation? We spent a lot of time thinking about this and now have a plan that looks legit, and that we are currently implementing. I'm sure you want to know more about it, right? In this talk, we will share the approach we’ve taken to address these challenges and we will present the architecture we designed. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/WWAVBQ/
Joining the conversation: balancing privacy with usability for encrypted messages (matrix-conf-2025)
Being able to read the conversation in a room before you joined is a critical feature for some usecases, but end-to-end encryption makes it tricky to implement. In this technically-focussed talk, we'll cover the challenges behind implementing "history sharing", why previous attempts in this area failed, and how we solved those problems with minimal impact on the security or efficiency of the protocol. The Element Crypto team have been working on [MSC4268](https://github.com/matrix-org/matrix-spec-proposals/pull/4268), aka "Sharing room keys for past messages". We'll talk about why this is difficult from the cryptographic perspective, and discuss the architecture behind the implementation. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/VLF9QQ/
No Desk Is an Island: Enabling Cross-Border Workspace Communication (matrix-conf-2025)
As EU member states (co-)develop sovereign workspace solutions for the public sector, the need for seamless communication between these platforms becomes increasingly important. France, Germany, and the Netherlands are among the countries working on such solutions together, with the goal of facilitating cross-border collaboration and data exchange while maintaining security and sovereignty. In collaboration with our French and Dutch partners, we at ZenDiS are developing a framework to enable communication between our openDesk office and collaboration suite and its international equivalents. Our effort aims to facilitate cross-border information sharing and promote a more integrated European digital landscape. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/7SRHXV/
Invisible Crypto: can Matrix be both secure and easy to use? (matrix-conf-2025)
The Invisible Crypto initiative intends to make Matrix easier to use by ensuring that encrypted messaging is secure by default, and the user is not bothered by irrelevant information. In this talk we will give a status update, hopefully explaining why crypto needed to become slightly more visible on the journey towards making it disappear. We'll go into some detail about what we've done (and why some of it makes things a little more noisy) and what we plan to do to really get there. We've been working on the Invisible Crypto initiative for over a year, and arguably things have got worse rather than better: some parts of Matrix crypto are more visible than they were before. We will go into some detail about what we've done so far and why those things temporarily make more noise, but will eventually lead to a peaceful, hassle-free experience of encrypted messaging. Most of the coding has been done in matrix-rust-sdk and the Element clients, but the intention is for these efforts to serve as examples for other implementations. Key goals of the initiative are to ignore "insecure" devices, and treat user identities as trust-on-first-use by default. To make these possible, we have worked on a lot of things that actually make crypto more visible: - Shields for messages from insecure devices - Encouraging device verification - Building a shared language to talk about crypto - Noticing and warning about devices with incomplete crypto information - Warnings about messages whose sender identity is unsure - Letting the user know when an identity changes and we plan to continue with things that mostly make crypto less visible, while also becoming more secure: - Excluding insecure devices - Authenticated backup - Sharing identity updates between devices - Fixing bugs that allow a device's crypto information to be incomplete - Showing identity changes in timelines instead of pop-ups - "Dehydrated" devices so messages received while logged out can be decrypted - Recovery key management Improving crypto-related code is always painstaking, but we hope to convince you that we are making steady progress, and demonstrate how you can help! Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/BT8WR9/
Rocket.Chat: Entering the Matrix (matrix-conf-2025)
In this talk, we trace the journey of evolving Rocket.Chat from a standalone collaboration server into a full-fledged Matrix home-server — all built in TypeScript. We’ll dive into the architecture decisions, the incremental features (federation, room state sync, identity translation, event routing, crypto, and bridging), and the real challenges of combining two paradigms (Rocket.Chat’s internal model + the Matrix spec) in one codebase. You’ll hear about lessons learned: when to build vs reuse, how we manage consistency under asynchronous federation, strategies for performance and rate limits, and how we maintain feature parity while gradually merging homeserver responsibilities. Whether you’re running a chat platform, building a new homeserver, or simply interested in bridging monolithic systems with Matrix, this session will provide deep technical insight and lessons you can bring back to your project. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/J7YNGR/