Skip to content
Tran Smart Project

Tran Smart Project

Explore the General, Enhance Health, Nourish with Food, and Embrace Yoga

Primary Menu
  • Home
  • General
  • Health
  • Food
  • Yoga
  • Contact Us
  • Home
  • Latest
  • E2E encrypted social networking built on Matrix

E2E encrypted social networking built on Matrix

Amanda Furness September 9, 2021 4 min read
2942

Today social networking has become an essential part of our culture, enriching our lives with socialization, communication, entertainment, news, networking, sharing, and so on. Due to its growing popularity, it has attracted hackers, who are interested in breaking into the network. Encryption is the only way to protect the network from enemy’s attack, but currently many social networking sites are still not encrypted.

We are thrilled to announce greater improvements to our platform with the release of Matrix 4.2. Matrix 4.2 is an application designed to enable secure, encrypted communication between people on the Internet. We are building Matrix on top of BitTorrent’s P2P technology, which provides decentralized, resilient, and trust-based communication that is not dependent on a third party. We are proud to be working with BitTorrent on this project, and to see Matrix widely used by our users. We look forward to further maturing our product with the release of BitTorrent 7.2, which will include an additional feature of easily verifying the identities of the people using Matrix.

Matrix is a private social networking platform for people looking to meet new friends, share their thoughts, work on projects, and stay in touch with loved ones. Users are free to post any length of content, including text, audio, images, web links, videos, and group notes. Matrices core is about creating a web of trust, where each user has a cryptographic identity that is not tied to their real name. Matrices goal is to create a healthy, secure, healthy, social, mobile, matrix-based social networking platform.

Circles is a brand-new kind of safe social sharing software.

It’s like an encrypted messenger with the appearance and feel of a social network. Circles may also be thought of as a social networking program in which every post is encrypted from beginning to finish.

Which one is it, exactly? At the same time, it’s both.

Encryption from beginning to end (E2E)

Every message you send via Circles is encrypted from your smartphone to your friends’ devices. Only the individuals you’ve asked to join your social circles and groups may view the messages and pictures you post.

Matrix is the foundation of Circles. It utilizes the same E2E security protocols as Matrix’s encrypted group chat, Olm and Megolm. Circles does not try to create its own encryption algorithm. Instead, all security and encryption operations are handled by the Matrix iOS SDK.

This app is compatible with the iPhone, iPad, and iPod Touch.

Circles for iOS should work on any iOS 14+ smartphone. One of our main goals for the future is to create an Android version of Circles.

Groups and Circles

We offer two types of social structures in the Circles app: circles and groups.

Circles and groups screenshots

Because groups are easier to understand, we’ll start with them.

Individuals in Private Groups

A group in the Circles app functions similarly to a group in other apps. It has a well-defined membership, and everyone who belongs to it is in the same group as everyone else. Everything posted in the group is visible to everyone in the group.

Groups screenshots

In the real world, any organized collection of individuals is generally a good match for a group in the app. Consider the following scenario:

  • Your book discussion group.
  • Your softball team’s name is
  • On your street or in your building, the individuals who reside there.
  • Preschool classroom for your child. (At least, the parents and instructors.) Preschoolers should not be allowed to use social media.)

Any well-organized collection of individuals with clearly defined membership would be a good match for a group in the app.

Social Circles That Are Safe

Like genuine, organic human social circles, circles are loose, fluid, and overlapping.

In the actual world, if you and I are friends, your circle of friends is likely to differ significantly from mine. That’s OK.

Similarly, just because you and I are family does not imply that the individuals you regard to be family are the same people I consider to be family. For starters, if you and I are blood relations, your in-laws are very certainly unrelated to me, and vice versa.

And, once again, that’s just OK. That is the way human connections function. Circles are our means of assisting technology in catching up to social reality.

A circle is a suitable match for any kind of relationship in which each person has their own network of connections apart from everyone else’s.

Circles screenshots

Perhaps the simplest way to conceive of a circle is as if it were a microcosm of your own private, secure version of Facebook. The only people in there are the ones you really care about, and they’re only talking about topics you both care about. Each circle serves as a personal “wall” or “page” where you may exchange information. It also provides you with your own private timeline of updates from your circle’s pals.

Encrypted Photo Galleries are a bonus feature.

We also provide you with password-protected picture galleries. You may either share a gallery with your friends and family or keep it private as an encrypted cloud backup of your pictures.

Photo gallery screenshots

Galleries also make it simpler to organize pictures that you wish to share with several groups or circles. You can share a picture with a group or a circle with only a few clicks on the screen if you first submit it to a gallery.

GitHub

https://github.com/KombuchaPrivacy/circles-ios

Social networking is changing. More people are building websites, wikis, and online communities. They’re making money on top of their internet presence. This is the Transmart Project.. Read more about matrix chat and let us know what you think.

Related Tags

  • matrix riot
  • matrix synapse
  • riot-im
  • matrix messaging
  • matrix clients

Continue Reading

Previous: 100% Instant Access to the website
Next: Searching for Online Casinos: How to Choose One

Trending Now

What to do If Your T-Mobile Order Gets Backordered? 1

What to do If Your T-Mobile Order Gets Backordered?

April 14, 2022
Philips Respironics DreamStation alternative CPAP machines 23rd December 2021 2

Philips Respironics DreamStation alternative CPAP machines 23rd December 2021

December 24, 2021
17 Keto Salad Dressings – Best Low Carb Dressings 3

17 Keto Salad Dressings – Best Low Carb Dressings

December 15, 2021
7 Yoga Poses for Plus Size Beginners 4

7 Yoga Poses for Plus Size Beginners

December 7, 2021

Related Stories

Personalized Medicine in Vein Health: Turning Data into Tailored Treatments
5 min read

Personalized Medicine in Vein Health: Turning Data into Tailored Treatments

September 18, 2025 31
Bridging Research and Patient Care: Vein Health as a Case Study
5 min read

Bridging Research and Patient Care: Vein Health as a Case Study

September 18, 2025 35
Maximizing Casino Bonuses in Canada: Tips and Strategies
2 min read

Maximizing Casino Bonuses in Canada: Tips and Strategies

September 14, 2025 39
Features That Define the Perfect Online Casino Platforms in 2025
4 min read

Features That Define the Perfect Online Casino Platforms in 2025

September 13, 2025 41
Types of THCA Flower and How to Choose the One
5 min read

Types of THCA Flower and How to Choose the One

September 11, 2025 51
Modern Kitchens Require Modern Solutions: Your Guide to a Seamless Contemporary Upgrade
4 min read

Modern Kitchens Require Modern Solutions: Your Guide to a Seamless Contemporary Upgrade

September 10, 2025 59

more posts you may like

A Comprehensive Resource Guide for New Cannabis Retailers 1

A Comprehensive Resource Guide for New Cannabis Retailers

September 19, 2025
Personalized Medicine in Vein Health: Turning Data into Tailored Treatments 2

Personalized Medicine in Vein Health: Turning Data into Tailored Treatments

September 18, 2025
Bridging Research and Patient Care: Vein Health as a Case Study 3

Bridging Research and Patient Care: Vein Health as a Case Study

September 18, 2025
How Can You Prepare for Outdoor Adventures to Keep Devices and Personal Items Secure? 4

How Can You Prepare for Outdoor Adventures to Keep Devices and Personal Items Secure?

September 16, 2025
Maximizing Casino Bonuses in Canada: Tips and Strategies 5

Maximizing Casino Bonuses in Canada: Tips and Strategies

September 14, 2025
8645 Polmado Avenue
Dalen, SC 81536
  • Privacy Policy
  • Terms & Conditions
  • About
All Rights Reserved © transmartproject.org
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT