Why We Abandoned Matrix (2024)
Matrix metadata, security, and protocol design
- Original article’s claims about Matrix metadata and “central servers” are strongly disputed by Matrix contributors; some details (like unauthenticated media) are outdated.
- Matrix admits metadata protection lagged behind E2EE, citing focus on getting decentralized encryption stable and limited funding.
- New work aims to encrypt more room state (e.g. MSC4362, MLS-based proposals that hide sender IDs), with more improvements planned for 2026.
- Critics say the underlying protocol is overcomplicated (state DAGs, state groups, custom resolution algorithms) and fundamentally flawed for secure group messaging; Nebuchadnezzar is cited as a key critique.
- Some argue secure + federated group messaging may be inherently very hard or impossible; others think Matrix is just “doing it on hard mode,” constrained by backward compatibility.
Performance, state resolution, and server operations
- Many admins report Matrix homeservers as resource-heavy versus XMPP, with large room state and state groups consuming gigabytes.
- State resolution used to brick rooms; the Hydra project is said to have fixed the worst issues, though skeptics doubt all edge cases are gone.
- Synapse’s storage inefficiencies are acknowledged; attempts to rewrite in Go (Dendrite) stalled due to funding, leading instead to multi-process and Rust-worker approaches within Synapse.
Client UX, keys, and onboarding
- Element Web/desktop is widely criticized as slow, memory-hungry, and buggy, with confusing login/auth flows and key management (e.g. cookies/local storage holding encryption keys; users who clear them break sessions).
- Some users find basic features (custom emoji, statuses, bios, simple invite links) still missing or arriving very late.
- Others report smooth experiences, especially on newer Element X clients and private/self-hosted setups; they suspect many horror stories come from older clients or overloaded public servers.
Federation vs full decentralization
- Several commenters reject the article’s “Why Federation Must Die” stance. They view federation as crucial for censorship resistance and resistance to state control, even if it leaks more metadata.
- Others argue P2P/fully decentralized designs are preferable, though they note real-world tradeoffs: mobile battery use, latency, and the need for relay/edge servers that reintroduce federation-like trust issues.
- Some reference earlier critiques of federation (e.g. from Signal’s founder) about coordination friction and slow evolution, but see those as tradeoffs rather than fatal flaws.
Alternatives: XMPP, SimpleX, and others
- XMPP is repeatedly praised: extremely lightweight to host, mature, “just works” for many families and communities, though it lacks some of Matrix’s modern features (cross-signing, rich rooms, video, etc. without extensions).
- A few wish the ecosystem had doubled down on XMPP instead; they blame “hatred of XML” and shifting investment for its stagnation.
- SimpleX is the article’s preferred alternative, but commenters enumerate drawbacks:
- No native multi-device, time-limited undelivered messages, unclear queue durability.
- Harder onboarding (sharing large links/QR codes out-of-band).
- Heavy VC funding and unclear incentives for queue operators.
- Claims of “no identifiers” viewed as misleading because queue IDs still function as identifiers; IPs leak to hosting providers.
- Plans for blockchain-based “vouchers” are seen by some as “crypto creep,” though the project insists they are non-tradable service credits, not coins.
- Some mention other P2P tools (Keet, Cwtch, Scuttlebutt), but note issues like closed source, no Tor integration, or immature UX.
Moderation, abuse, and legal risk
- A major fear is liability for illegal content (especially CSAM) on federated servers: operators can’t easily prevent their caches from being used to distribute abusive media.
- Examples are given of slow or ineffective moderation on public Matrix and ActivityPub instances, leading some admins to advise defederation or shutting down.
- Matrix points to newer “policy servers” and a larger trust & safety team as progress, but critics say tooling remains weak for public-internet abuse scenarios.
Divergent experiences and community priorities
- Some long-time users report Matrix as stable, secure “enough,” featureful, and uniquely positioned (bridges, self-hosting, E2EE, cross-platform) — good enough to replace Slack/Discord for many teams.
- Others have abandoned Matrix after repeated bugs, lost messages, complex self-hosting, and UX friction, arguing its existence “crowds out” potentially better OSS chat systems.
- A meta-thread notes a split in the “anti–big tech” world:
- One camp prioritizes federation/self-hosting and control over infrastructure.
- Another prioritizes maximal privacy, minimal metadata, and robust E2EE above all.
- Commenters suggest recognizing these divergent goals makes it easier to understand why some see Matrix as “almost there” and others see it as fundamentally wrong for their threat model.