fix merge

This commit is contained in:
creme 2021-08-06 11:20:25 +02:00
commit aedbefe8dd
No known key found for this signature in database
GPG Key ID: C147C3B7FBDF08D0
64 changed files with 87 additions and 80 deletions

View File

@ -11,7 +11,7 @@ The recommended client for using Matrix is called Element and can be used on dif
- **Element Desktop:** [Downloads for Linux/Windows/Mac](#element_desktop)
- **Element mobile:** [Android/iOS](#element_mobile)
![Element page for client download](/images/12_Element-Download.png)
![Element page for client download](/images/12_Element-Download.png "Element page for client download")
## Element Web

View File

@ -7,7 +7,7 @@ date: 2021-08-03T20:30:00+02:00
Start here: [https://element.envs.net](https://element.envs.net)
![Start page of Element Webclient with login button](/images/01_Welcome_en.png)
![Start page of Element Webclient with login button](/images/01_Welcome_en.png "Start page of Element Webclient with login button")
Registration is necessary, the service can be used by clicking on "Create Account" on the homepage [https://element.envs.net](https://element.envs.net).
@ -15,12 +15,14 @@ After the Registration you need to confirm your account. Check your mail Inbox.
Now you can Login to your webclient.
![Login window with request to enter Username and Password](/images/02_Login1_en.png)
![Login window with request to enter Username and Password](/images/02_Login1_en.png "Login window with request to enter Username and Password")
The drop-down menu "Log in with:" should be left at "Username". Then the following entries must be made:
**Username**
Enter here your username from envs.net starting with a `@` sign followed by your username and the text `:envs.net`. For the user `isabell` it should like `@isabell:envs.net`.
**Password**
Analogous to e-mail addresses, this results in matrix addresses with the following structure:
@ -30,16 +32,11 @@ Analogous to e-mail addresses, this results in matrix addresses with the followi
!!! note
If you want to start immediately with a [Matrix Client](/clients/) instead of the above mentioned website (Element Web-App hosted on envs.net), it is important to change the home server from the usually default `matrix.org to` [`https://matrix.envs.net`](https://matrix.envs.net) (shown in the following three screenshots)
![Change login page with focus on the homeserver Button](/images/02_Login2_en.png)
![Change login page with focus on the homeserver Button](/images/02_Login2_en.png "Change login page with focus on the homeserver Button")
1. click on change
![input field to change the home server with the input matrix.envs.net](/images/02_Login3_en.png)
![Input field to change the home server with the input matrix.envs.net](/images/02_Login3_en.png "Input field to change the home server with the input matrix.envs.net")
2. mark the preset home server address and remove it
![](/images/02_Login4_en.png)
3. entry of the matrix home server address of envs.net
## Browser settings
@ -52,7 +49,7 @@ Recommended are the browsers [Firefox](https://www.mozilla.org/de/firefox/new/),
Many people use script blockers to protect themselves from [Tracking](https://tu-dresden.de/tu-dresden/newsportal/news/datenschutz-beim-website-tracking) and malware in the browser, for example with the addon [NoScript](https://addons.mozilla.org/de/firefox/addon/noscript/). Here you have to make the following settings (for the integration manager, e.g. Jitsi/Etherpad)
![Browser plugin settings NoScript with envs.net selected as trusted script sources](/images/10_Sicherheit2_en.png)
![Browser plugin settings NoScript with envs.net selected as trusted script sources](/images/10_Sicherheit2_en.png "Browser plugin settings NoScript with envs.net selected as trusted script sources")
### Cookies

View File

@ -9,20 +9,20 @@ Downloads for: [:fontawesome-solid-download: Windows](https://packages.riot.im/d
After a desktop installation, make sure to use the existing account or create a new account on the envs.net homeserver. Here the example of Element:
![Selected login button in the element matrix client](/images/01_Login_en.png)
![Selected login button in the element matrix client](/images/01_Login_en.png "Selected login button in the element matrix client")
This is done by clicking on **Change**. Then you will not accidentally end up on the wrong server...
This is done by clicking on **Edit**. Then you will not accidentally end up on the wrong server...
![Change login page with focus on the homeserver button](/images/02_Change-Homeserver_en.png)
![Change login page with focus on the homeserver button](/images/02_Change-Homeserver_en.png "Change login page with focus on the homeserver button")
Now you can manually specify the home server: `matrix.envs.net`
![Input field to change the home server with the input matrix.envs.net](/images/03_Set-Homeserver_en.png)
![Input field to change the home server with the input matrix.envs.net](/images/03_Set-Homeserver_en.png "Input field to change the home server with the input matrix.envs.net")
Afterwards the one-time login with Username and Password must be carried out:
![Login window with request to enter Username and Password](/images/04_Username_en.png)
![Login window with request to enter Username and Password](/images/04_Username_en.png "Login window with request to enter Username and Password")
By activating the slider under `All Settings` > `Preferences` > **`Automatic start after system login`**, the element client starts after every reboot and you no longer miss any notifications due to accidentally closing the browser tab in the usage variant with the Web App.
By activating the slider under `All Settings` > `Preferences` > **`Start automatically after system login`**, the element client starts after every reboot and you no longer miss any notifications due to accidentally closing the browser tab in the usage variant with the Web App.
![settings marked with the dot start automatically after system startup](/images/05_Settings_en.png)
![settings marked with the dot start automatically after system startup](/images/05_Settings_en.png "Start automatically after system login")

View File

@ -32,3 +32,8 @@ sudo pacman -Sy element-desktop
```sh
nix-env -iA nixos.element-desktop
```
### macOS homebrew
```sh
brew install element
```

View File

@ -9,6 +9,6 @@ Downloads for: [:fontawesome-solid-download: Android (Google Play)](https://play
The following series of images shows screenshots of the setup of Android or iOS Element:
![Screenshot of the login procedure under Android/iOS](/images/15_Android1_en.png)
![Screenshot of the login procedure under Android/iOS](/images/15_Android1_en.png "Screenshot of the login procedure under Android/iOS")
![Screenshot of the Android client element after successful login](/images/15_Android2_en.png)
![Screenshot of the Android client element after successful login](/images/15_Android2_en.png "Screenshot of the Android client element after successful login")

View File

@ -9,7 +9,7 @@ Currently envs.net does not pay for the use of the source code. The Matrix-Admin
Matrix is an open standard, the details of interoperable communication using the matrix set of HTTP-APIs are freely published. Matrix is also open source, which means that the source code of the reference servers, clients and services has been released to the public under the Apache v2 license to encourage everyone to run their own servers and clients.
![free software banner](images/free-software-likes-you-and-your-freedom.webp)
![free software banner](images/free-software-likes-you-and-your-freedom.webp "free software banner")
Since it is free software, improvement requests can be converted into direct programming jobs.

View File

@ -9,31 +9,31 @@ date: 2021-08-03T20:30:00+02:00
The decision whether a created room should be encrypted in this way must be well thought out and cannot be undone. If the room is large or public, checking all keys of all interlocutors could take a lot of time. But this manual check can be done later on occasion and end-to-end encrypted conversations can be started directly with blind trust for the time being.
![Create new room with activated encryption](images/01_Create-Room-wE2E_en.png)
![Create new room with activated encryption](images/01_Create-Room-wE2E_en.png "Create new room with activated encryption")
If you want end-to-end encryption (E2EE) to interlocutor:inside in an unencrypted room, you can achieve this by clicking on the settings of the desired room. (or in the room via "Room info" > "Room settings" in the upper right corner):
![Menu to get to the room settings](images/02_Roomsettings_en.png)
![Menu to get to the room settings](images/02_Roomsettings_en.png "Menu to get to the room settings")
To do this, move the Encrypted slider on the Security & Privacy tab:
![Enable encryption in the room settings](images/03_Roome2e_en.png)
![Enable encryption in the room settings](images/03_Roome2e_en.png "Enable encryption in the room settings")
This can be confirmed with OK. From now on the messages can only be read by those involved in the conversation. If you have not set up a key protection in the settings before, you should do this now (see [Important settings](/settings/)) to be able to read earlier and in absence received messages.
Now the encrypted exchange can begin. If you want to verify the correctness of the keys and to document this trustworthiness digitally, you first have to unfold the sidebar by clicking on the person symbol in the upper right corner:
![open the list of persons in the room](images/04_RoomPeople_en.png)
![Open the list of persons in the room](images/04_RoomPeople_en.png "Open the list of persons in the room")
The contact person can now be clicked on in the opening bar of the participants in the conversation:
![room with note that not all participants are verified](images/05_People-Unverified_en.png)
![Room with note that not all participants are verified](images/05_People-Unverified_en.png "room with note that not all participants are verified")
The bar now shows the conversation person in detail. Here a key verification can be initiated by clicking on "Verify". By clicking on "Start Verification" the other side is notified and after confirmation (see next picture) the "Verification by Emojis" can start.
![Menu to the person to verify selected with the verify button](images/06_E2EE_Verify_en.png)
![Menu to the person to verify selected with the verify button](images/06_E2EE_Verify_en.png "Menu to the person to verify selected with the verify button")
![Menu to start the verification](images/07_E2EE_Accept_en.png)
![Menu to start the verification](images/07_E2EE_Accept_en.png "Menu to start the verification")
This verification should be done with the contact person by comparison (e.g. verbally via telephone, in the same room or other medium). Since this is not always easy, the trust can also be expressed first of all (otherwise you will be asked again and again to carry out the verification) and carried out on occasion (e.g. at the next meeting).
@ -41,22 +41,22 @@ A detailed description of the topic can be found [in this Matrix blog article](h
The adjustment itself is done via emoji images or QR codes, which can look different depending on the device and icon pack. Also the translation of all interface elements into German is not 100% available.
![Emoji comparison to verify the key exchange](images/16_E2EE.png)
![Emoji comparison to verify the key exchange](images/16_E2EE.png "Emoji comparison to verify the key exchange")
This is done analogously in rooms with several participants, each one individually.
![verification process was successful](images/08_Verified_en.png)
![Verification process was successful](images/08_Verified_en.png "Verification process was successful")
In the respective room rows the following symbols indicate the status of the encryption and the corresponding verification:
![symbol for at least one non-verified person](images/gray.png)
![Symbol for at least one non-verified person](images/gray.png "Symbol for at least one non-verified person")
At least one person in the room has not yet been verified.
![symbol for a verified person who has opened unverified sessions](images/unverified.png)
![Symbol for a verified person who has opened unverified sessions](images/unverified.png "Symbol for a verified person who has opened unverified sessions")
There is at least one person in the room who has already been verified, but who in turn has opened further unverified sessions.
![symbol for all persons in the room are verified](images/green.png)
![Symbol for all persons in the room are verified](images/green.png "Symbol for all persons in the room are verified")
All persons in the room were verified.

View File

@ -14,15 +14,15 @@ Downloads for: [:fontawesome-solid-download: Windows](https://packages.riot.im/d
After a desktop installation, make sure to use the existing account. Here the example of Element:
![Selected login button in the element matrix client](/images/01_Login_en.png)
![Selected login button in the element matrix client](/images/01_Login_en.png "Selected login button in the element matrix client")
This is done by clicking on **Change**. Then you will not accidentally end up on the wrong server...
![Change login page with focus on the homeserver button](/images/02_Change-Homeserver_en.png)
![Change login page with focus on the homeserver button](/images/02_Change-Homeserver_en.png "Change login page with focus on the homeserver button")
Now you can manually specify the home server: `matrix.envs.net`
![Input field to change the home server with the input matrix.envs.net](/images/03_Set-Homeserver_en.png)
![Input field to change the home server with the input matrix.envs.net](/images/03_Set-Homeserver_en.png "Input field to change the home server with the input matrix.envs.net")
Afterwards the login with username and password must be carried out:
@ -30,6 +30,8 @@ The drop-down menu "Log in with:" should be left at "Username". Then the followi
**Username**
Enter here your username from envs.net starting with a `@` sign followed by your username and the text `:envs.net`. For the user `isabell` it should like `@isabell:envs.net`.
**Password**
An alternative login, e.g. using the e-mail address, is **NOT** possible during the first, initial login, only after the second login.
@ -40,7 +42,7 @@ Analogous to e-mail addresses, this results in matrix addresses with the followi
`@username:envs.net`
![Login window with request to enter Username and Password](/images/04_Username_en.png)
![Login window with request to enter Username and Password](/images/04_Username_en.png "Login window with request to enter Username and Password")
## Convenient use of end-to-end encryption (E2EE)
@ -49,29 +51,31 @@ Matrix not only encrypts transports to and from the home server of envs.net but
!!! danger
It is highly recommended to use this key backup (with a secure security phrase which is **NOT** your login password)!
![Prompt to generate the security key or enter a security phrase](/images/11_Setup-Key_en.png)
![Prompt to enter a password for the key backup](/images/12_Enter-Key_en.png)
Alternatively, instead of the security phrase, you can also have a security key generated that serves the same purpose as the security phrase. Furthermore, the security key is generated in addition to the security phrase and should be kept safe and retrievable as an emergency key (e.g. save it as .txt file AND print it out)
![Display of the security key to write or save away](/images/13_Present-Key_en.png)
![Prompt to generate the security key or enter a security phrase](/images/11_Setup-Key_en.png "Prompt to generate the security key or enter a security phrase")
![Prompt to enter a password for the key backup](/images/12_Enter-Key_en.png "Prompt to enter a password for the key backup")
Alternatively, instead of the security phrase, you can also have a security key generated that serves the same purpose as the security phrase. Furthermore, the security key is generated in addition to the security phrase and should be kept safe and retrievable as an emergency key (e.g. save it as .txt file AND print it out)
![Display of the security key to write or save away](/images/13_Present-Key_en.png "Display of the security key to write or save away")
[Other important settings](/settings/) may improve your Matrix experience!
## Requests to setup the key backup
![Screenshot of the prompt to enter a security phrase](/images/01_Restore-Session_en.png)
![Screenshot of the prompt to enter a security phrase](/images/01_Restore-Session_en.png "Screenshot of the prompt to enter a security phrase")
If you skipped the request to setup the key backup, the next screen would look like this:
![Confirmation of skipping the input of a security phrase](/images/03_Cancel-Restore_en.png)
![Confirmation of skipping the input of a security phrase](/images/03_Cancel-Restore_en.png "Confirmation of skipping the input of a security phrase")
Key protection is highly recommended for worry-free end-to-end encryption. For this reason, a smaller tooltip will prompt you to set up the encryption even after you skip further:
![Chat view showing a tooltip to set up encryption. Marking the confirm field](/images/04_Notification_en.png)
![Chat view showing a tooltip to set up encryption. Marking the confirm field](/images/04_Notification_en.png "Chat view showing a tooltip to set up encryption. Marking the confirm field")
If you omit this here as well, you will get a last warning if you log off consciously. If no key backup is set up at the latest, encrypted calls that may have already taken place cannot be accessed later. If the tab is closed, this also corresponds to a logout.
![Query if messages should be encrypted](/images/05_Logout-Notify_en.png)
![Query if messages should be encrypted](/images/05_Logout-Notify_en.png "Query if messages should be encrypted")
Avoid this situation by setting up a key backup!

Binary file not shown.

Before

Width:  |  Height:  |  Size: 88 KiB

After

Width:  |  Height:  |  Size: 144 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 72 KiB

After

Width:  |  Height:  |  Size: 128 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 75 KiB

After

Width:  |  Height:  |  Size: 143 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.9 MiB

After

Width:  |  Height:  |  Size: 1.7 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.9 MiB

After

Width:  |  Height:  |  Size: 1.7 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 70 KiB

After

Width:  |  Height:  |  Size: 148 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 58 KiB

After

Width:  |  Height:  |  Size: 65 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.9 MiB

After

Width:  |  Height:  |  Size: 1.7 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 17 KiB

After

Width:  |  Height:  |  Size: 165 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.4 MiB

After

Width:  |  Height:  |  Size: 1.3 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.5 MiB

After

Width:  |  Height:  |  Size: 1.4 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.4 MiB

After

Width:  |  Height:  |  Size: 1.3 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.0 MiB

After

Width:  |  Height:  |  Size: 228 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 89 KiB

After

Width:  |  Height:  |  Size: 153 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 91 KiB

After

Width:  |  Height:  |  Size: 150 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.8 MiB

After

Width:  |  Height:  |  Size: 1.7 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 110 KiB

After

Width:  |  Height:  |  Size: 170 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 110 KiB

After

Width:  |  Height:  |  Size: 147 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.0 MiB

After

Width:  |  Height:  |  Size: 228 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 78 KiB

After

Width:  |  Height:  |  Size: 137 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 62 KiB

After

Width:  |  Height:  |  Size: 79 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 102 KiB

After

Width:  |  Height:  |  Size: 147 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 127 KiB

After

Width:  |  Height:  |  Size: 151 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.5 MiB

After

Width:  |  Height:  |  Size: 178 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 96 KiB

After

Width:  |  Height:  |  Size: 146 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 128 KiB

After

Width:  |  Height:  |  Size: 140 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 130 KiB

After

Width:  |  Height:  |  Size: 125 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 71 KiB

After

Width:  |  Height:  |  Size: 130 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 67 KiB

After

Width:  |  Height:  |  Size: 77 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 127 KiB

After

Width:  |  Height:  |  Size: 149 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 89 KiB

After

Width:  |  Height:  |  Size: 112 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 103 KiB

After

Width:  |  Height:  |  Size: 114 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 76 KiB

After

Width:  |  Height:  |  Size: 91 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 40 KiB

After

Width:  |  Height:  |  Size: 244 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 46 KiB

After

Width:  |  Height:  |  Size: 207 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 31 KiB

After

Width:  |  Height:  |  Size: 67 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 20 KiB

After

Width:  |  Height:  |  Size: 51 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 131 KiB

After

Width:  |  Height:  |  Size: 165 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 76 KiB

After

Width:  |  Height:  |  Size: 91 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 42 KiB

After

Width:  |  Height:  |  Size: 43 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 89 KiB

After

Width:  |  Height:  |  Size: 69 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 78 KiB

After

Width:  |  Height:  |  Size: 84 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 73 KiB

After

Width:  |  Height:  |  Size: 52 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 72 KiB

After

Width:  |  Height:  |  Size: 49 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 103 KiB

After

Width:  |  Height:  |  Size: 104 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 75 KiB

After

Width:  |  Height:  |  Size: 82 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 164 KiB

After

Width:  |  Height:  |  Size: 183 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 138 KiB

After

Width:  |  Height:  |  Size: 109 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 41 KiB

After

Width:  |  Height:  |  Size: 68 KiB

View File

@ -11,17 +11,20 @@ Matrix is a free and open, secure, decentralized protocol for real-time communic
***
basic information about our Homeserver instance:<br />
basic information about our Homeserver instance:
[https://envs.net/chat/matrix/](https://envs.net/chat/matrix/)
***server admin:*** [`@creme:envs.net`](https://matrix.to/#/@creme:envs.net)<br />
***space:*** [`#space:envs.net`](https://matrix.to/#/#space:envs.net)<br />
***channel:*** [`#envs:envs.net`](https://matrix.to/#/#envs:envs.net)<br />
***server admin:*** [`@creme:envs.net`](https://matrix.to/#/@creme:envs.net)
***space:*** [`#space:envs.net`](https://matrix.to/#/#space:envs.net)
***channel:*** [`#envs:envs.net`](https://matrix.to/#/#envs:envs.net)
***abuse management room:*** [`#abuse:envs.net`](https://matrix.to/#/#abuse:envs.net)
***
<figure>
<object data="images/matrix_interactive_en.svg" type="image/svg+xml" style="width: 1280px; max-width: 100%"></object>
<caption><i>Interactive Image - <a href="images/matrix_interactive_en.svg" target="_blank">click here for the fullscreen version</a></i></caption>
</figure>
In recent years, the need for supporting digital tools for team collaboration has increased. A central tool is a team chat. According to Wikipedia, a chat refers to "electronic communication by means of written text in real time, usually via the Internet" ([Source](https://en.wikipedia.org/wiki/Chat)). With a messenger team members can make each other aware of current information and especially share links (*hyperlinks* / *links*) for further collaboration (e.g. for finding appointments, collaborative writing, planning events, editing data, code, mind maps,).
@ -48,15 +51,13 @@ In recent years, the need for supporting digital tools for team collaboration ha
### Questions and Contact
The ideal is to deal with problems in a transparent way, from which all others can learn. This can be done by describing the situation in the ENVS main room - here problems and solutions can be discussed together:<br />
[#envs:envs.net](https://matrix.to/#/#envs:envs.net)
The ideal is to deal with problems in a transparent way, from which all others can learn. This can be done by describing the situation in the ENVS main room - here problems and solutions can be discussed together: [#envs:envs.net](https://matrix.to/#/#envs:envs.net)
E-mail: [hostmaster@envs.net](mailto:hostmaster@envs.net)
!!! tip
For some anomalies you can try to empty the cache and reload everything:<br />
For some anomalies you can try to empty the cache and reload everything:
`Settings > Help & About > Clear Cache and reload`
!!! note
Current maintenance is announced in the matrix room [#home:envs.net](https://matrix.to/#/#home:envs.net) (unfederated) and
[#status:envs.net](https://matrix.to/#/#status:envs.net).
Current maintenance is announced in the matrix room [#home:envs.net](https://matrix.to/#/#home:envs.net) and [#status:envs.net](https://matrix.to/#/#status:envs.net).

View File

@ -7,7 +7,7 @@ date: 2021-08-03T20:30:00+02:00
Integrations/Widgets can be managed via the room information in the upper right corner.
![Add integration button](/images/01_Widgets_en.png)
![Add integration button](/images/01_Widgets_en.png "Add integration button")
Here, for example, an etherpad, a jitsi video conference, an RSS bot, etc. can be integrated, i.e. services that are located and run on other servers. Therefore, when using integrations, the JavaScript activity of vector.im (for the integration manager) and other servers (e.g. in the Firefox addon NoScript) must be allowed. Since the widgets are often too small to use the services in their full functionality, widgets can often be opened large in new browser tabs.

View File

@ -7,7 +7,7 @@ date: 2021-08-03T20:30:00+02:00
To write to individual persons and thus create a 1:1 chat, first click on the + in the category "Direct messages":
![Click on the Start Chat button](/images/01_Start-Chat_en.png)
![Click on the Start Chat button](/images/01_Start-Chat_en.png "Click on the Start Chat button")
Now type in the search field and start typing the email address of the person you want to find:
@ -26,7 +26,7 @@ An invitation e-mail is not sent by Matrix.
In the search result, click on the target person and then on Go:
![A search result for the search query entered](/images/04_Found-and-Go_en.png)
![A search result for the search query entered](/images/04_Found-and-Go_en.png "A search result for the search query entered")
The conversation opens, which can begin after the connected person accepts the invitation [end-to-end encrypted](/encryption/) (meanwhile standard). The connection to the server at envs.net is of course also transport-encrypted. If you explicitly do not want end-to-end encryption for a special reason, an unencrypted room and invite the conversation partners to it.

View File

@ -23,10 +23,10 @@ Here experiences must be made if necessary, which help with the estimate, which
See [recommendations for first steps after first login](/settings/#other_important_settings)
![screenshot of the menu to select when to send notifications](/images/notifications2.webp)
![Screenshot of the menu to select when to send notifications](/images/notifications2.webp "Screenshot of the menu to select when to send notifications")
### Roomwise settings
When the mouse is moved over individual rooms in the room list, 3 grey dots appear on the right-hand edge for each room. After clicking on them, you can set up the notifications for each room individually.
![Screenshot of the notification options in the room settings](/images/notification-rooms.webp)
![Screenshot of the notification options in the room settings](/images/notification-rooms.webp "Screenshot of the notification options in the room settings")

View File

@ -8,7 +8,7 @@ date: 2021-08-03T20:30:00+02:00
Conversations are organized in matrix in rooms. 1:1 conversations are also rooms, but for now with only two people. In this
Category is about
1. [create rooms](/rooms/create/)
2. [find rooms](/rooms/find/)
3. [delete rooms](/rooms/delete/)
4. [share rooms](/rooms/sharing/)
1. [Create rooms](/rooms/create/)
2. [Find rooms](/rooms/find/)
3. [Delete rooms](/rooms/delete/)
4. [Share rooms](/rooms/sharing/)

View File

@ -14,35 +14,35 @@ Matrix not only encrypts transports to and from the home server of envs.net but
!!! danger
It is highly recommended to use this key backup (with a secure security phrase which is **NOT** your login password) and read on at [Other important settings](#other_important_settings)!
![Screenshot of the prompt to enter a security phrase](images/01_Restore-Session_en.png)
![Screenshot of the prompt to enter a security phrase](images/01_Restore-Session_en.png "Screenshot of the prompt to enter a security phrase")
If you skip this now, the next screen would look like this:
![Confirmation of skipping the input of a security phrase](images/03_Cancel-Restore_en.png)
![Confirmation of skipping the input of a security phrase](images/03_Cancel-Restore_en.png "Confirmation of skipping the input of a security phrase")
Key protection is highly recommended for worry-free end-to-end encryption. For this reason, a smaller tooltip will prompt you to set up the encryption even after you skip further:
![Chat view showing a tooltip to set up encryption. Marking the confirm field](images/04_Notification_en.png)
![Chat view showing a tooltip to set up encryption. Marking the confirm field](images/04_Notification_en.png "Chat view showing a tooltip to set up encryption. Marking the confirm field")
If you omit this here as well, you will get a last warning if you log off consciously. If no key backup is set up at the latest, encrypted calls that may have already taken place cannot be accessed later. If the tab is closed, this also corresponds to a logout.
![Query if messages should be encrypted](images/05_Logout-Notify_en.png)
![Query if messages should be encrypted](images/05_Logout-Notify_en.png "Query if messages should be encrypted")
## Other important settings
After successfully setting up the key backup, you now activate the desktop notifications:
![Screenshot of the query to activate push-benarchitecture](images/06_Enable-Notifications_en.png)
![Screenshot of the query to activate push-benarchitecture](images/06_Enable-Notifications_en.png "Screenshot of the query to activate push-benarchitecture")
This can be undone later and especially individual "conversations" can be set in their notification authority
Adjust settings in the Settings menu: to do this, click on the line of the e-mail address and the downward pointing triangle and then on the line "All settings":
![Selection of the menu item Settings in the user:inside menu](images/06_Settings_en.png)
![Selection of the menu item Settings in the user:inside menu](images/06_Settings_en.png "Selection of the menu item Settings in the user:inside menu")
In the settings you can change your display name ("First Name Last Name") in the **General** tab if necessary and upload a profile picture (select profile picture <5MB):
![Marking of the field Display name and profile picture in the settings](images/06_Settings-Names_en.png)
![Marking of the field Display name and profile picture in the settings](images/06_Settings-Names_en.png "Marking of the field Display name and profile picture in the settings")
The e-mail address field is not necessarily to be filled in, since an e-mail address is stored via your envs.net login. Theoretically you can add more addresses here, e.g. to have notifications about missed messages sent to another e-mail address.
@ -50,11 +50,11 @@ On the same page you can also change the design theme from light to dark.
In the **Notifications** tab you can activate e-mail notifications (to be informed about missed messages) as well as acoustic notifications and set them granularly for individual activities of others. For more information see the [notifications](/notifications/).
![Screenshot of the notification settings with a marker of the switched off e-mail notifications](images/06_Settings-EMailNotify_en.png)
![Screenshot of the notification settings with a marker of the switched off e-mail notifications](images/06_Settings-EMailNotify_en.png "Screenshot of the notification settings with a marker of the switched off e-mail notifications")
In the **Voice & Video** tab, you can authorize the Matrix client element to use your media (camera + microphone), allow direct voice/video calls via peer-to-peer connections, and in the case of video calls, to see yourself in a small picture:
![Screenshot of the settings menu language and video](images/06_Settings-Media_en.png)
![Screenshot of the settings menu language and video](images/06_Settings-Media_en.png "Screenshot of the settings menu language and video")
Fortunately, 1:1 calls start end-to-end encrypted by default. To really trust this encryption with a good feeling, users:inside can perform the key comparison with interlocutor:inside. To ensure that this also applies to all devices of these conversational partners, Matrix users must in turn verify the keys of all their devices with each other (technical term: cross-signing). If you follow the instructions below, this can be done very conveniently.
@ -64,7 +64,7 @@ In the **Security & Privacy** tab you will find all your devices that have been
* Remove any sessions that are no longer in use by marking the square box at the end of the line and clicking on the red button that appears.
![Screenshot of the menu for deleting active sessions](images/09_Delete-Sessions_en.png)
![Screenshot of the menu for deleting active sessions](images/09_Delete-Sessions_en.png "Screenshot of the menu for deleting active sessions")
* The device names also give you an overview when comparing keys between your devices.
@ -72,16 +72,16 @@ In the **Security & Privacy** tab you will find all your devices that have been
* The many cryptographic keys are stored on the respective device. If this is e.g. a tab in a browser, there is a risk that this tab will be closed unintentionally. Then all encrypted contents are no longer readable. To prevent this from happening, a key protection is offered on the home server of envs.net, on which (protected by a passphrase) all cryptographic keys are stored encrypted. It is strongly recommended to use this key backup!
![Screenshot of the menu item for key protection](images/10_Setup-Keystore_en.png)
![Screenshot of the menu item for key protection](images/10_Setup-Keystore_en.png "Screenshot of the menu item for key protection")
## Secure Backup
If not set up after initial registration: The **Secure Backup** is a valuable achievement, as it enables the keys of all end-to-end encrypted calls to be centrally secured on the envs.net server with a password. This allows convenient use of multiple devices or matrix clients. To do so, click on "Start using key backup" and choose a strong security phrase (but not the envs.net password). This security phrase will always have to be entered if keys are to be synchronized with the key backup.
![Prompt to generate the security key or enter a security phrase](images/11_Setup-Key_en.png)
![Prompt to generate the security key or enter a security phrase](images/11_Setup-Key_en.png "Prompt to generate the security key or enter a security phrase")
![Prompt to enter a password for the key backup](images/12_Enter-Key_en.png)
![Prompt to enter a password for the key backup](images/12_Enter-Key_en.png "Prompt to enter a password for the key backup")
Alternatively, instead of the security phrase, you can also have a security key generated that serves the same purpose as the security phrase. Furthermore, the security key is generated in addition to the security phrase and should be kept safe and retrievable as an emergency key (e.g. save it as .txt file or print it out)
![Display of the security key to write or save away](images/13_Present-Key_en.png)
![Display of the security key to write or save away](images/13_Present-Key_en.png "Display of the security key to write or save away")

View File

@ -11,7 +11,7 @@ Spaces can only be created for yourself or for others (if you invite them into a
Existing rooms can be assigned to a space in the space settings.
![Screenshot of the selection of the current community](images/20_spaces.webp)
![Screenshot of the selection of the current community](images/20_spaces.webp "Screenshot of the selection of the current community")
A space created with the + button can be drag'n'dropped from the spaces avatar (little picture) onto the sidebar.