Today's Deep-Dive: schleuder
Ep. 395

Today's Deep-Dive: schleuder

Episode description

In this episode, we take a deep dive into Schleuder, an open-source encrypted mailing list manager designed for organizations that need secure group communication without surrendering control to proprietary platforms. Starting with the basic problem of who really holds the keys to your organization’s most sensitive communications, we explore how Schleuder uses OpenPGP encryption to make secure mailing lists manageable, even in environments where legal, regulatory, and compliance requirements make privacy and auditability non-negotiable. Along the way, we unpack how Schleuder works under the hood, from public and private key encryption to its role as a secure gateway that can translate between encrypted internal conversations and unencrypted external contacts. The episode also looks at the practical realities of deploying and maintaining open-source security tools, including entropy, server dependencies, command-line and web-based administration, and the open-source community effort required to keep projects like this alive. More than just a technical walkthrough, this is a conversation about digital sovereignty, infrastructure ownership, and what it means to truly control the keys to your own communication systems.

Gain digital sovereignty now and save costs

Let’s have a look at your digital challenges together. What tools are you currently using? Are your processes optimal? How is the state of backups and security updates?

Digital Souvereignty is easily achived with Open Source software (which usually cost way less, too). Our division Safeserver offers hosting, operation and maintenance for countless Free and Open Source tools.

Try it now!

Download transcript (.srt)
0:00

[SPEAKER_00] So, imagine your organization gets a subpoena tomorrow.

0:05

[SPEAKER_01] Oh, wow, the ultimate nightmare scenario.

0:08

[SPEAKER_00] Right.

0:08

[SPEAKER_00] Regulators are suddenly demanding access to every piece of internal communication, every financial discussion, your audit trails in the last five years.

0:17

[SPEAKER_01] Yeah, that is a massive undertaking.

0:19

[SPEAKER_00] And if you're relying on one of those monolithic tech giants, like Microsoft or Google Workspace or any proprietary vendor to manage all that, you have to ask yourself, who actually owns that data?

0:30

[SPEAKER_01] Exactly.

0:31

[SPEAKER_01] Who actually holds the keys to your compliance vault?

0:34

[SPEAKER_00] Exactly.

0:34

[SPEAKER_00] And relying on these massive opaque ecosystems, it's not just a huge drain on your IT budget, which it is.

0:40

[SPEAKER_00] I mean, they are expensive.

0:42

[SPEAKER_01] Oh, absolutely.

0:42

[SPEAKER_01] The licensing fees alone.

0:44

[SPEAKER_00] Yeah.

0:44

[SPEAKER_00] But it's also a fundamental surrender of your data sovereignty.

0:48

[SPEAKER_00] And that actually brings us to the sponsor of today's deep dive, Safe Server.

0:52

[SPEAKER_01] Right.

0:52

[SPEAKER_00] Because Safe Server essentially flips the script on enterprise communication.

0:56

[SPEAKER_00] They help organizations find, implement, and run open source solutions that are tailored to your exact compliance needs.

1:02

[SPEAKER_01] Which is so critical when you're dealing with strict legal requirements.

1:05

[SPEAKER_00] Yeah, exactly.

1:06

[SPEAKER_00] Whether you're handling, like, email retention policies or protecting highly sensitive legal records, Safe Server guides you from the very first consulting phase all the way through to secure operation on servers located physically within the EU.

1:21

[SPEAKER_01] The physical location in the EU is a huge deal for data protection.

1:25

[SPEAKER_00] Huge.

1:26

[SPEAKER_00] You get robust protection, you retain complete sovereignty over your encryption keys, and, like we mentioned, you completely eliminate those premium licensing fees from the proprietary giants.

1:36

[SPEAKER_01] It's a win-win, really.

1:38

[SPEAKER_00] It is.

1:39

[SPEAKER_00] So you can start taking control of your own infrastructure right now by visiting www.safeserver.de.

1:45

[SPEAKER_01] Because honestly, the question of who physically holds your keys, that's the definitive dividing line in digital security today.

1:52

[SPEAKER_00] Yeah.

1:52

[SPEAKER_01] I mean, if an external vendor holds the keys, you don't really have a secure system.

1:56

[SPEAKER_01] You just have a permission slip.

1:58

[SPEAKER_00] That is so true, a permission slip, which actually makes this the perfect entry point for what we are unpacking today.

2:04

[SPEAKER_00] So welcome to the deep dive.

2:05

[SPEAKER_01] Glad to be here for this one.

2:07

[SPEAKER_00] Yeah, our mission for this session is to provide a beginner-friendly, easy entry point into a really fascinating piece of software called Shloider.

2:16

[SPEAKER_01] Shloider, yes.

2:17

[SPEAKER_00] And we are pulling this directly from the official website and their GitLab repository.

2:22

[SPEAKER_01] Great sources.

2:23

[SPEAKER_00] So whether you are a complete novice trying to understand how secure group communication actually functions or you're an IT admin looking to upgrade your group's secure communications, we're going to decode the technical jargon for you.

2:36

[SPEAKER_01] Because it can get pretty dense, honestly.

2:38

[SPEAKER_00] Oh, incredibly dense.

2:39

[SPEAKER_00] Yeah.

2:40

[SPEAKER_00] Like the official documentation defines Schleuter as a quote, GPG enabled mailing list manager with resending capabilities.

2:48

[SPEAKER_01] Yeah, that's a mouthful.

2:49

[SPEAKER_00] Right.

2:50

[SPEAKER_00] OK, let's unpack this because that sounds super technical.

2:52

[SPEAKER_00] I like to think of it as like a highly secure digital bouncer or maybe a bilingual translator for group emails.

2:59

[SPEAKER_01] That's actually a really good way to look at it because we need to break down that first half, the GPG enabled mailing list manager part.

3:05

[SPEAKER_00] Right, because what does that actually mean?

3:07

[SPEAKER_01] Well, it solves a very specific mathematically brutal problem in cryptography.

3:14

[SPEAKER_01] GPG relies on OpenPGT, which is an asymmetric encryption standard.

3:18

[SPEAKER_00] Okay, asymmetric, meaning two keys.

3:21

[SPEAKER_01] Right, exactly.

3:22

[SPEAKER_01] Every user has two keys.

3:24

[SPEAKER_01] A public key, which is like an open padlock you just hand out to the world.

3:27

[SPEAKER_00] I can give that to anyone.

3:28

[SPEAKER_01] Anyone.

3:29

[SPEAKER_01] And then a private key, which is the unique physical key you keep hidden, and that's the only thing that unlocks the padlock.

3:35

[SPEAKER_00] So if I want to send you a secure message, I take your public padlock, lock my message inside a box, and send it over the internet.

3:43

[SPEAKER_00] And even if someone intercepts it, it doesn't matter because you are the literally only person with the private key to open it.

3:49

[SPEAKER_01] Precisely.

3:50

[SPEAKER_01] That's the mechanism.

3:51

[SPEAKER_01] But now imagine trying to scale that up for a group.

3:53

[SPEAKER_01] OK. Let's say your organization has a management team of 50 people.

3:56

[SPEAKER_00] 50 people, right.

3:57

[SPEAKER_01] If you want to send a single secure email to that entire group using standard OpenPGP, your email client has to encrypt that message 50 separate times.

4:07

[SPEAKER_01] Wow.

4:07

[SPEAKER_01] Using 50 different public padlocks.

4:10

[SPEAKER_00] OK, that sounds like a total logistical nightmare for the person just trying to press Send.

4:14

[SPEAKER_01] Oh, it's a massive computational bottleneck.

4:18

[SPEAKER_01] But the administrative burden is honestly even worse.

4:21

[SPEAKER_00] How so?

4:22

[SPEAKER_01] Well, think about it.

4:23

[SPEAKER_01] What happens if one of those 50 people loses their private key?

4:26

[SPEAKER_00] Oh, right.

4:27

[SPEAKER_00] Or someone leaves the company.

4:28

[SPEAKER_01] Exactly.

4:29

[SPEAKER_01] Or a new person joins.

4:31

[SPEAKER_01] The entire group has to constantly manually update their local address books with the correct public keys for every single member.

4:39

[SPEAKER_00] That's impossible to manage perfectly.

4:42

[SPEAKER_01] It is, and if one person has an outdated key for a colleague, the whole security chain fractures.

4:48

[SPEAKER_01] It's known as the N-squared problem of decentralized key management.

4:52

[SPEAKER_00] Okay, so this is where Schleuter steps in to kind of fundamentally alter the architecture of the group, right?

4:58

[SPEAKER_00] Exactly.

4:58

[SPEAKER_00] Instead of this chaotic web where everyone manages 50 different padlocks, Schleuter acts as that highly secure digital bouncer I mentioned, standing at the door of the club.

5:07

[SPEAKER_01] Right, the central point.

5:09

[SPEAKER_00] Yeah, so the mailing list itself gets a single master padlock.

5:12

[SPEAKER_00] If I want to email the management team, I just encrypt my message once using the list's master public key, and I send it to the bouncer.

5:18

[SPEAKER_01] And then the bouncer's loader takes over.

5:19

[SPEAKER_01] It's the only entity that actually holds the private key for the list.

5:23

[SPEAKER_00] OK, so it opens the box.

5:24

[SPEAKER_01] Yes, it receives your locked box, opens it, verifies that you are a legitimate subscriber, and then it does the heavy lifting.

5:31

[SPEAKER_00] Like re-encrypting it.

5:32

[SPEAKER_01] Exactly.

5:33

[SPEAKER_01] Schleuter automatically re-encrypts the message 50 times using the public keys of the current subscribers and then distributes it.

5:39

[SPEAKER_00] Wow, okay.

5:40

[SPEAKER_00] So the sender only ever needs to know one single key.

5:43

[SPEAKER_01] just one, and the administrator can update the subscriber list centrally so that whole n squared problem just completely disappears.

5:50

[SPEAKER_00] That is brilliant.

5:51

[SPEAKER_01] Yeah.

5:52

[SPEAKER_00] But the documentation also emphasizes this gateway concept, right?

5:57

[SPEAKER_00] The rescinding capability?

5:58

[SPEAKER_01] Yes, the rescinding aspect.

6:00

[SPEAKER_00] Which kind of introduces a fascinating vulnerability to me.

6:03

[SPEAKER_01] Yeah.

6:04

[SPEAKER_00] Because a steel vault is secure, sure, but only because nothing goes in or out.

6:09

[SPEAKER_01] Right.

6:10

[SPEAKER_00] But human communication doesn't work that way.

6:12

[SPEAKER_00] Like a legal team needs to receive emails from outside counsel.

6:17

[SPEAKER_00] A journalist needs to get tips from an unencrypted source.

6:20

[SPEAKER_01] Absolutely.

6:21

[SPEAKER_00] So as a layperson, I have to ask, how does this gateway process an external, completely unencrypted email without shattering the security of the internal subscribers?

6:33

[SPEAKER_01] It operates essentially as an automated cryptographic bridge.

6:36

[SPEAKER_01] OK. Let's say an external vendor sends a standard plain text email to the Schluter list address.

6:43

[SPEAKER_00] Just a normal email?

6:44

[SPEAKER_01] Just a normal email.

6:44

[SPEAKER_01] OK. Because Schluter sits on the server monitoring the traffic, it catches that plain text email before it ever hits the internal network.

6:52

[SPEAKER_00] Oh, I see.

6:52

[SPEAKER_01] It securely wraps the message, encrypts it using the internal subscriber's public keys, and delivers it securely to them.

6:59

[SPEAKER_00] Meaning the internal team maintains their strict cryptographic discipline.

7:04

[SPEAKER_00] Like, they only ever see an encrypted message in their inbox.

7:07

[SPEAKER_01] Exactly.

7:07

[SPEAKER_00] What happens when they hit reply?

7:09

[SPEAKER_00] Because they're replying encrypted, right?

7:10

[SPEAKER_01] Right.

7:10

[SPEAKER_01] So the process just reverses.

7:12

[SPEAKER_01] The internal team drafts a highly secure encrypted reply, sends it to Schluter.

7:17

[SPEAKER_01] OK. Schluter decrypts the message, translates it back into a standard plain text email, and sends it out to the external vendor.

7:24

[SPEAKER_00] Wow.

7:25

[SPEAKER_00] So the vendor just sees a totally normal email conversation.

7:27

[SPEAKER_01] Exactly.

7:28

[SPEAKER_01] They don't have to install OpenPGP.

7:29

[SPEAKER_01] They don't have to manage keys.

7:31

[SPEAKER_01] No technical training required at all.

7:33

[SPEAKER_01] It completely decouples the internal security protocol from the external user experience.

7:39

[SPEAKER_00] Decoupling that experience is so smart.

7:41

[SPEAKER_00] But man, it must require a serious engine underneath.

7:44

[SPEAKER_01] Oh, it absolutely does.

7:45

[SPEAKER_00] Yeah, because looking at the GitLab documentation, the tech stack required to run this digital bouncer is pretty extensive.

7:52

[SPEAKER_01] It is a lot to take in at first glance.

7:54

[SPEAKER_00] It says it requires Ruby version 2.7 or higher, GNOPG for the cryptography, Scolite 3 for the database, OpenSSL, plus this specific array of Ruby gems like ActiveRecord and Sinatra.

8:08

[SPEAKER_01] Yep.

8:08

[SPEAKER_01] All of those are essential.

8:09

[SPEAKER_00] I mean, for a beginner or an IT volunteer looking at this, it just seems like an overwhelming amount of moving parts to configure.

8:15

[SPEAKER_00] I'm intimidated just writing it on behalf of the listener.

8:17

[SPEAKER_01] It's totally fair to feel that way.

8:19

[SPEAKER_01] If you attempt to compile all those dependencies from scratch, it is extremely complex.

8:24

[SPEAKER_00] Right.

8:24

[SPEAKER_01] But the developers know this.

8:26

[SPEAKER_01] They've provided simplified installation packages for major platforms.

8:30

[SPEAKER_00] Oh, OK. Like what?

8:31

[SPEAKER_01] They've specifically tested on Debian version 12 codename Bookworm, as well as Centos 7 and Arch Linux.

8:39

[SPEAKER_01] They essentially prepackage that complex environment for you.

8:42

[SPEAKER_00] OK, that is a huge relief.

8:44

[SPEAKER_00] But there is one highly specific, fascinating detail from the readme that we really have to talk about.

8:50

[SPEAKER_00] The entropy requirement.

8:51

[SPEAKER_00] Yes.

8:52

[SPEAKER_00] The developers explicitly recommend running a random number generator daemon called Havaged on the server.

8:59

[SPEAKER_00] They say this is to ensure the system won't get blocked by, quote, lacking entropy, especially during key generation.

9:06

[SPEAKER_01] Entropy is such a crucial concept in cryptography.

9:09

[SPEAKER_00] It really is.

9:09

[SPEAKER_00] It's like to explain entropy to a beginner, you basically need enough chaotic random ingredients to bake a truly unpredictable cryptographic cake.

9:18

[SPEAKER_01] That's a great analogy.

9:19

[SPEAKER_00] Because if you don't have enough entropy, the system can literally just stop.

9:22

[SPEAKER_00] It gets blocked.

9:23

[SPEAKER_01] What's fascinating here is how this quirky technical requirement connects to the broader picture of true security.

9:30

[SPEAKER_01] Well, encryption relies on genuine randomness, not just math.

9:35

[SPEAKER_01] Algorithms are entirely deterministic.

9:38

[SPEAKER_01] If you put the same starting numbers in, you always get the exact same output.

9:42

[SPEAKER_00] Which means if a hacker knows your starting numbers, they can reverse engineer your supposedly secure key.

9:47

[SPEAKER_01] Exactly.

9:48

[SPEAKER_01] You need true chaos.

9:50

[SPEAKER_01] Right.

9:50

[SPEAKER_01] But a computer is a machine literally built to eliminate chaos.

9:54

[SPEAKER_01] It processes logic sequentially.

9:56

[SPEAKER_00] Right.

9:57

[SPEAKER_01] So to find unpredictable inputs, a standard server looks for microscopic physical variation.

10:03

[SPEAKER_00] Like what kind of variations?

10:04

[SPEAKER_01] It might measure the exact milliseconds between keystrokes on a keyboard or tiny temperature fluctuations of the processor.

10:10

[SPEAKER_00] But a headless server sitting in a data center somewhere doesn't have a keyboard or a mouse.

10:15

[SPEAKER_01] Exactly.

10:15

[SPEAKER_01] It's just quietly processing network requests.

10:18

[SPEAKER_01] It isn't generating enough physical chaos.

10:20

[SPEAKER_00] And when that entropy pool drains, the cryptographic engine literally halts.

10:24

[SPEAKER_01] Right.

10:25

[SPEAKER_01] It refuses to generate a predictable key.

10:27

[SPEAKER_01] So the process blocks.

10:28

[SPEAKER_01] And that's where HaveEdged becomes critical.

10:31

[SPEAKER_01] It constantly analyzes unpredictable timing variations in the processor itself.

10:36

[SPEAKER_01] acting like an artificial chaos blender.

10:38

[SPEAKER_00] I love that.

10:39

[SPEAKER_00] We spend millions building hyperlogical data centers only to realize our security fundamentally depends on measuring the physical imperfections of the silicon itself.

10:49

[SPEAKER_01] It's beautifully ironic.

10:50

[SPEAKER_00] It really is.

10:53

[SPEAKER_00] Moving from the physical hardware to the actual human beings writing the code, the ethos surrounding Schluter is equally fascinating.

11:00

[SPEAKER_01] The mission statement is incredibly powerful.

11:02

[SPEAKER_00] It is.

11:03

[SPEAKER_00] Like code doesn't just write itself.

11:05

[SPEAKER_00] And the developers explicitly state they give their time and knowledge to help people with daily private communication.

11:11

[SPEAKER_00] But also, and this is a direct quote from the sources in the struggle for personal emancipation, social and economic justice, and political freedom.

11:18

[SPEAKER_01] It's so rare for a technical manual to have such a clear philosophical stance.

11:22

[SPEAKER_00] Yeah.

11:23

[SPEAKER_00] We're not endorsing any political side here, obviously, but just looking at their intent, it's clear they see open source software as a real tool for social change.

11:31

[SPEAKER_01] Absolutely.

11:32

[SPEAKER_01] They recognize that privacy is a fundamental prerequisite for political organizing.

11:37

[SPEAKER_00] And here's the pushback.

11:39

[SPEAKER_00] The reality of open source development is harsh.

11:42

[SPEAKER_00] Very harsh.

11:43

[SPEAKER_00] If you look at their GitLab page, which was created back in January 2017,

11:48

[SPEAKER_00] It has over 1600 commits.

11:50

[SPEAKER_00] But right there, prominently, is this bold plea.

11:53

[SPEAKER_00] Maintainers want it.

11:55

[SPEAKER_01] Yeah, that part is sobering.

11:57

[SPEAKER_00] The current team openly admits they have, quote, hardly any time left for the project.

12:03

[SPEAKER_00] They don't want the project to die.

12:05

[SPEAKER_00] But for a sustainable future, they say it needs new humans to care for it.

12:09

[SPEAKER_01] And that exposes a huge vulnerability in our digital infrastructure.

12:13

[SPEAKER_01] Software isn't just a static object you build once and leave on a shelf.

12:16

[SPEAKER_00] No, it rots.

12:17

[SPEAKER_01] Exactly.

12:18

[SPEAKER_01] Operating systems update.

12:19

[SPEAKER_01] Underlying libraries find vulnerabilities.

12:21

[SPEAKER_01] If it isn't actively maintained, it breaks down.

12:23

[SPEAKER_00] And digital freedom relies on actual human labor, unpaid human labor often.

12:28

[SPEAKER_01] Which is a precarious position for everyone relying on these tools.

12:31

[SPEAKER_00] So building on this call for new humans, if a beginner or a new maintainer actually wants to interact with the Schluter ecosystem, how do they get started?

12:40

[SPEAKER_01] The developers have structured it with dual options for administration.

12:43

[SPEAKER_00] OK, what are they?

12:45

[SPEAKER_01] For traditional server admins, there is Schluter Klee, which is a command line interface.

12:49

[SPEAKER_01] You manage everything in the terminal.

12:51

[SPEAKER_00] But that's not great for an office manager.

12:55

[SPEAKER_01] No, not at all.

12:56

[SPEAKER_01] Which is why they have an API built with that Sinatra gem we mentioned.

12:59

[SPEAKER_00] Oh, right.

13:00

[SPEAKER_01] And that allows for an optional web interface called Schluter Web.

13:03

[SPEAKER_01] So users who prefer a browser can manage things graphically instead of using terminal request keywords.

13:09

[SPEAKER_00] OK, so it's accessible.

13:11

[SPEAKER_00] But what about the developers?

13:12

[SPEAKER_00] Is it a chaotic environment for them?

13:14

[SPEAKER_01] Not at all.

13:15

[SPEAKER_01] It's highly structured.

13:17

[SPEAKER_01] They use a tool called SurSpec for automated code testing, and they're always trying to extend that test coverage.

13:22

[SPEAKER_01] That's smart.

13:23

[SPEAKER_01] Plus, they've adopted a formal code of conduct, and it's all licensed under the GNU GPL 3.0.

13:29

[SPEAKER_00] Which keeps it permanently open source, right?

13:31

[SPEAKER_01] Yeah, exactly.

13:32

[SPEAKER_01] If we connect this to the binger picture, this structured, welcoming documentation

13:37

[SPEAKER_01] is exactly how open source projects try to lower the barrier to entry for beginners and potential new maintainers.

13:45

[SPEAKER_00] They need it to be welcoming if they want people to stay.

13:47

[SPEAKER_01] Absolutely.

13:48

[SPEAKER_00] Which honestly, seamlessly transitions us back to the practical realities of deploying this kind of software.

13:54

[SPEAKER_00] Because implementing these solutions requires strategic planning.

14:00

[SPEAKER_00] And that brings us back to our sponsor, Safe Server.

14:02

[SPEAKER_01] A vital partner in all of this.

14:04

[SPEAKER_00] Truly.

14:05

[SPEAKER_00] Whether you are a business, an association, or any other group, there is so much to gain by switching to an open source solution like Schluter.

14:13

[SPEAKER_01] The gains in compliance and data privacy are massive.

14:16

[SPEAKER_00] Massive.

14:16

[SPEAKER_00] Yeah.

14:17

[SPEAKER_00] And the significant cost savings over those proprietary giants we talked about earlier.

14:21

[SPEAKER_01] You really can't understate the cost factor.

14:23

[SPEAKER_00] Right.

14:24

[SPEAKER_00] And SafeServer can actually be commissioned for consulting.

14:27

[SPEAKER_00] Whether the right fit for your organization is Schluter or maybe a comparable open source alternative, they help you figure it out.

14:33

[SPEAKER_01] They handle the heavy lifting.

14:34

[SPEAKER_00] Exactly.

14:35

[SPEAKER_00] All the way to secure operation on EU servers.

14:38

[SPEAKER_00] You can find more information at www.safeserver.de.

14:43

[SPEAKER_01] You know, exploring Schlatter leaves me with a lingering question for our listeners to ponder on their own.

14:48

[SPEAKER_00] Oh, what's that?

14:49

[SPEAKER_01] If tools that are deeply vital for our political freedom, our compliance, and our daily privacy are largely sustained by the dwindling free time of volunteer maintainers, what does that mean for the long-term fragility of our global digital infrastructure?

15:04

[SPEAKER_00] Wow, that is a heavy thought to end on, but so important to consider.

15:08

[SPEAKER_00] Thank you so much for joining me on this exploration of the sources today.

15:11

[SPEAKER_01] Super pleasure.

15:12

[SPEAKER_00] And thank you all for listening.

15:13

[SPEAKER_00] We will see you on the next Deep Dive.