This version of the document is no longer canonical. You can find the canonical version hosted at Gitlab and Github.
PART 2 IS OUT, INCLUDING THE DISCLOSURE OF A GLOBAL FEDERATION DATA LEAK, AND THE ANATOMY OF A GDPR DATA REQUEST HANDLED BY MATRIX.ORG. SEE THE REPOS ABOVE.
@ara4n Given that we're not going to be significantly changing the doc anymore, as the target audience has given us the feedback we were looking for, I'll wrap this up by answering your notes at the time posted as a gesture of good faith and respect. I'll use the comment numbering from the PDF directly.
Comment 1
The integration manager is closed source, and its behaviour has been documented here. So the only way to learn about its behaviour was to reverse engineer it with the client and the homeserver. Reverse engineering is factual and we did use it. 100% relevant.
Comment 2
Does it really?. It can, but it doesn't have to. It's just your choice is making synapse do it.
Comment 3
The document does not say it is mandatory. Only that the user is strongly pushed to do it.
Comment 4
The document does not say it is mandatory. Only that the user is not informed of the specifics (single contact vs the whole phonebook).
Comment 5
Except that's not what we're talking about. You're in the TL;DR section, read everything first.
Comment 6
That the file is called "MatthewPicture2015.jpg" or "dkjkjfoeDSDfdsfkERR" makes no difference that it's publicly accessible. And that all files in the repo are. There is no access control.
Comment 7
But encryption is not enabled by default, and the doc states it reviews default behaviour.
Comment 8
Let's get some facts straight:
So while the previous quoted statement is technically correct as of today, ignoring everything since start of 2017, the following is not:
You haven't been holding out for decentralised because of mxisd since mxisd supported the needed features for at least 18 months. During that time, you never reached out to us despite our efforts. Matrix.org always had higher priorities than Identity and privacy.
mxisd is NOT the reason why no progress was made. Your prioritization which you did all on your own is. We can also talk about how you deprioritized working on 1194 purposefully only because I requested updates about it and triggered its own Email removal section.
You have been well-informed about mxisd capabilities which you even mentioned in FOSDEM presentations in 2017 (or maybe 2018, possibly both). Dave is in the room and his role as a core board member is to be aware of what is going on. You have been purposefully lying about this for years now in an attempt to hide what mxisd could accomplish while remaining spec compliant. Why?
Comment 9
You highlighted this:
but the full sentence is this:
Please give a link to the source that those two fit the requirements in the same sentence: which federates and can include data from vector.im..
Comment 10
We agree.
Comment 11
Thank you for confirming that our statement is factually correct.
Comment 12
Thank you for confirming that our statement is factually correct.
Comment 13
So to find the privacy policy of vector.im we need to go to github.com, then find a doc under a matrix.org folder...
How is a user new to Matrix supposed to know that if all they see is
vector.im
in the Identity Server URL field of their client?What about a link on your main website: https://vector.im/?
Ok for the oversight.
Comment 14
But you still need the Identity server to add the Email to the user setting, right? Your comment seems out of place.
Comment 15
We shown in the document in the first section of Riot that the user was never told about the binding. That would make your UX unacceptable, right?
Comment 16
Yes, for the people that the user wants to talk to, not for the full address book before the user can even start looking for the contact. What about only when a person click on the contact they are interested in? (or whatever UX you could wipe up).
Comment 17
OK.
Comment 18
OK.
Comment 19
My gut feeling is that it would be stated in their terms of services or their cookie policy which you need to accept upon using their services. Double checking will be left as an exercise to the readers. I don't think explaining why it's set makes it any relevant when the website is very sensitive to privacy. You would definitely not want that to be set.
Comment 20
The research paper does not have proposals in scope, only spec documents published as standard/stable at the time of writing.
Comment 21
I don't see the relevance of your comment. We gave the link so people can see the request/response. That it's federation doesn't matter to the point made.
Comment 22
Until we wrote the doc (so not including your last comment on it written after), the bug never talked about removing the calls, just to not duplicate them. The privacy issue around it is not even mentioned once, and the issue is open for ~18 months. That it was already documented would not have helped for the issue at hand.
Do you have some other documentation that shows you were aware of the privacy issue around the behaviour, or that the behaviour was problematic in the first place?
Comment 23
The context that you miss to quote in its entirety (emphasis mine):
The sentence means:
In both cases, the request you've given as an example is indeed the one. Thank you for confirming this is factually correct.
Comment 24
Github again? Is this link also given one way or another to the user directly in Riot when they use the integration manager? If yes, could you show us a screenshot please?
Comment 25
Yes, and the document specifically state at the beginning that default settings is what is taken into account, which is therefore well in scope.
Thank you for confirming that our statement is factually correct.
Comment 26
Yes, and the document specifically state at the beginning that default settings is what is taken into account, which is therefore well in scope.
Thank you for confirming that our statement is factually correct.
Comment 27
I believe we are now at our 3rd one.
Comment 28
Which is the case by default as per comment 26.
Thank you for confirming that our statement is factually correct.
Comment 29
But it is secure right? You do not seem to oppose the statement.
Comment 30
But End-to-End encryption is not enabled by default, so it's not in scope of this document.
Comment 31
So for now, they are not.
Thank you for confirming that our statement is factually correct.
Comment 32
We recognise we used a bad example to illustrate that the files are forever accessible under the same ID. We have corrected our document with a better illustration. Thank you for pointing it out.
Comment 33
But still in use. And I'm guessing always been in use. So it only was obvious during reverse engineering (!).
Comment 34
Thank you for confirming that our statement is factually correct.
Comment 35
Thank you for confirming that our statement is factually correct.
Comment 36
OK
Comment 37
Double check your document. Your copy/paste screwed up the formatting and the full context is there. Compare with the Gist view of the original doc.
About other Homeservers being affected in their use of the Matrix.org services by the outage: Thank you for confirming that our statement is factually correct. The context is clear and the next sentence specifically list what was affected. We do not state that they were compromised. The next section talks about how they could have been impacted from a security point of view, or be affected by Denial of Service.
Comment 38
We removed that sentence soon after reading your feedback. Thank you for clarifying.
Comment 39
Thank you for confirming the impact that the pattern of centralisation outlined in this document could have allowed the attacker to do "a lot of very unpleasant things".
Comment 40
Thank you for confirming that our statement is factually correct.
Comment 41
Let's respectfully agree to disagree.
Comment 42
We've clarified our wording soon after seeing your feedback of taking a sentence out of the important context. We recognise that our wording could have been misleading.
Comment 43
OK, but you do not answer the questions. GDPR is a law in effect for more than a year. You simply cannot process the personal identifiable data that you currently get without a lawful basis.
What is the lawful basis under which you process their personal data, since we've illustrated all over the document that you do not get informed consent?
Comment 44
I did disclose Grid in previous research document like The Server ACL one, but you used it against us to say "look, they are promoting their hostile fork by using Matrix weaknesses instead of contributing to it!". Now that we don't and make sure it's only about Matrix in the document, you also use it against us. You also never fail to slander us for something which is your own fault in the official Matrix rooms.
So here is me asking you officially, in a public setting, on record: Which one do you want? Disclosure or not disclosure?
I hope all the links, sources and issues I have linked and mentioned here are proof enough that I was very much trying to make you aware of all of this, but nobody was listening, or was purposefully dragging their feet to make a point instead of thinking for their users.