Home The Linux Distillery Make your own encrypted chat server

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

CryptoAUSTRALIA is running a workshop on 5 July to help you build your own end-to-end encrypted chat server ... while you still can.


CryptoAUSTRALIA says proposals have been made to ban, weaken or backdoor encryption in Australia. "The aim is to allow law enforcement agencies to peek into encrypted messages on the wire," the organisation says.

To help you enjoy a secure and free chat experience, CryptoAUSTRALIA has announced a workshop to teach how you can set up your own self-hosted end-to-end encrypted chat server. The workshop will be on 5 July at 6pm in the Sydney CBD.

The technologies to be used are Matrix and Riot.

Matrix is an open standard for decentralised communication and Riot allows teams to communicate across a wide range of collaboration apps.

The goal of this workshop is to teach you how to configure and run your own Matrix/Riot service. By the end of the workshop, you will be able to log into secure chat rooms with your phone and computer and invite others to the same server.

The workshop has limited spaces, so RSVP via Meetup.com if you are interested; you will also find the address on the Meetup page.

The workshop will be Linux-based. Windows users are also free to attend, but should prepare for the workshop by downloading an SSH client such as PuTTY beforehand.

Be sure to bring your own fully-charged laptop. If you wish to keep your server running after the workshop you should also organise a registered domain name of your own, plus a virtual server running in the cloud.

A domain name and virtual server will be made available during the workshop so those without can still participate, and then re-implement their server at a later date.


Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


David M Williams

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.


Popular News




Guest Opinion


Sponsored News