Security Explained

Security Explained

At, we prioritize the security and privacy of our customers. This page provides insights into the security measures and policies we have in place.

Security Measures

We have implemented the following security measures:

  • Firewall: Protecting against unauthorized access.
  • Intrusion Prevention: Detecting and mitigating potential threats.
  • SSH Daemon Hardening: Enhancing the security of SSH access.
  • OS-Level Permissions: Matrix components run under separate Linux cgroups and namespaces.
  • Docker Containers Hardening: Ensuring the security of our containerized environments.
  • Single Source of Truth: Any modifications to Matrix component configurations are wiped and replaced during each maintenance run.

Data Access

What Data Can Be Accessed by

We can access the following types of data:

  • Any system file (due to SSH access with sudo permissions).
  • Any plaintext (unencrypted) information, such as unencrypted text messages from bridged chats.

What Data Can NOT Be Accessed by

We cannot access encrypted data, including encrypted messages, files, and more.


How Customers Can Check Server Activity?

Customers can monitor server activity using the following methods:

  • /var/log/auth.log: This log is available by default. Additional archived logs may also be present, such as /var/log/auth.log.1, /var/log/auth.log.2, and so on.
  • The Linux Audit : Customers can leverage this audit framework for in-depth monitoring.
  • Source Code Availability: In nearly all actions performed by our automation system on customers’ servers, the source code is accessible on .

Don't have a Matrix server yet?

We specialize in setup, hosting and maintenance of Matrix and various Matrix & non-Matrix add-ons.
Hosting is on affordable VPS servers provided by us (via Hetzner Cloud) in the EU or US, or on your own infrastructure anywhere in the world.

Let's build your Matrix haven together!

Order Now