Verifying your Matrix devices is becoming mandatory
What “verification” actually is
- Not ID/KYC or device attestation; it’s cryptographic device linking.
- Matrix has two layers:
- Login to homeserver (username/password, like OAuth).
- Separate cryptographic identity + room keys for E2EE.
- “Verification” is how a new device proves it belongs to your cryptographic identity and receives your encryption keys.
- Main methods:
- Compare emoji sequence on old + new device.
- Scan a QR code between devices.
- Enter a recovery key (or exported key file) that decrypts the key backup stored on the server.
What the change does
- Element (and, via spec, other clients) will start refusing to send/receive E2EE messages from unverified devices.
- Purpose: stop unnoticed “extra devices” (e.g. logins from stolen credentials) from silently reading encrypted conversations, and reduce “cannot decrypt” errors by forcing correct key flows.
User experience: polarized feedback
- Some report verification as fast and reliable for years, preferring it to Signal/WhatsApp because it’s not tied to a phone number and can be recovered from a master key.
- Others describe it as a “nightmare”:
- Cross‑client verifications failing or looping.
- Devices randomly losing verified status.
- Recovery keys/passphrases UI confusing or broken in some Element versions.
- Popups for long‑gone devices that can’t be cleared.
- Casual/infrequent users and families are especially affected; several say this change will effectively lock their relatives out.
- Element X is seen as cleaner by some, but missing features, buggy verification flows, and unified-push requirements are pain points.
Impact on ecosystem (clients, bots, and servers)
- Simpler or experimental clients and bots often don’t implement verification, so they may be unable to participate in encrypted rooms once this is enforced.
- Admins of small private homeservers (no federation, trusted users) want a way to disable mandatory verification; otherwise bridges/bots break.
Broader Matrix critiques raised
- Protocol seen as complex, “eventually consistent JSON DB” rather than focused chat, making UX fragile.
- E2EE praised but metadata and room names remain unencrypted; some argue privacy is weaker than Signal’s model.
- Persistent complaints about moderation, especially image/CSAM spam on large public servers, and the lack (or slowness) of tools like per‑room media restrictions.
Alternatives discussed
- XMPP (Prosody, Snikket, Movim), IRC (+bridges), Signal, SimpleX, Delta Chat, Zulip, and Mattermost are mentioned as options with different trade‑offs in UX, features, and privacy.