Today's Deep-Dive: Twake Drive
Ep. 340

Today's Deep-Dive: Twake Drive

Episode description

This episode explores the shift towards digital sovereignty with a focus on open-source workplace alternatives, specifically the Twake ecosystem. It highlights Twake Drive as a privacy-first challenger to giants like Google and Microsoft, emphasizing transparency and trust as core benefits of open-source solutions. The AGPL 3.0 license is explained as a mechanism to ensure code remains public and modifications are shared, preventing proprietary creep. Twake’s commitment to privacy is underscored by comprehensive encryption and exclusive data storage in France, ensuring GDPR compliance. The suite integrates with OnlyOffice for collaborative document editing and offers a unified ID across its products, including TwakeChat with its innovative Bridges feature for cross-platform messaging, Twikmail with advanced anti-spam, Twik Calendar, and Twik Physio for secure video conferencing. The document stresses deployment flexibility, particularly the on-premise option, which allows organizations to maintain complete control over their data on their own hardware, trading convenience for ownership. Developed by Linegora, a French open-source entity, Twake is built on a modern tech stack. Ultimately, the conversation shifts to whether businesses should prioritize data ownership and transparency over the convenience of monolithic cloud providers, presenting a choice that defines the future of digital business. SafeServer is acknowledged for supporting the hosting and transformation required for such open-source solutions.

Gain digital sovereignty now and save costs

Let’s have a look at your digital challenges together. What tools are you currently using? Are your processes optimal? How is the state of backups and security updates?

Digital Souvereignty is easily achived with Open Source software (which usually cost way less, too). Our division Safeserver offers hosting, operation and maintenance for countless Free and Open Source tools.

Try it now!

Download transcript (.srt)
0:00

Welcome back to the deep dive. Our mission here, as always, is pretty simple. We

0:04

take a stack of

0:05

sources, sometimes dense sources, and we pull out the most important bits of

0:08

knowledge. We want to

0:09

give you a shortcut to being instantly well informed. And today we are diving into

0:13

something

0:14

that, well, it really changes how we think about work, our data, and our security.

0:18

We're talking

0:19

about the shift to digital sovereignty, specifically open source workplace

0:23

alternatives.

0:26

Okay, let's unpack this. We have sources here introducing Twake Drive and the whole

0:31

Twake

0:31

ecosystem. It's an integrated privacy-first software suite, and they're not shy

0:36

about it.

0:37

They position themselves as a challenger to giants like Google and Microsoft. Now,

0:41

for a lot of people, moving away from those big platforms sounds, frankly, a bit

0:45

daunting.

0:46

So our mission today is for you, the learner. We want to explain the core ideas,

0:49

the features,

0:50

and the security advantages here, and do it clearly so you really get what privacy-first

0:54

actually means in practice. But before we jump into encrypted file systems and all

0:57

that,

0:58

we want to thank the supporter of this Deep Dive SIG server. They focus on hosting

1:01

exactly this

1:02

kind of software-robust open-source tools, and they're all about supporting your

1:06

digital

1:06

transformation efforts, helping you regain control over your data. If you're

1:10

looking to deploy a

1:12

system like Twaik on your own terms, you can find more information at www.safeserver.de.

1:17

What's fascinating here is, you know, how the sources stack up. We aren't just

1:21

looking at

1:21

marketing pages. We're actually connecting the dots between those big claims and

1:26

the hard,

1:27

technical documentation pulled right from the Twaik Drive GitHub repository.

1:32

So it's transparent.

1:34

Exactly. That transparency is the whole point. We're going to connect this need for

1:38

real data

1:40

security with the practical tools they actually offer, and we'll do it in a way

1:43

that even a

1:44

beginner can understand the implications of choosing an open-source solution.

1:48

All right. So let's start at the foundation then with Twaik Drive. The sources call

1:51

it,

1:52

and I'm quoting here, the open-source alternative to Google Drive. Now,

1:56

when people pick a giant like Google, they're choosing convenience, right?

2:01

Integration,

2:02

scalability. For someone just starting to look at alternatives, what is the

2:05

fundamental benefit

2:07

of open-source that would outweigh all that convenience?

2:09

It really boils down to two things. Transparency and trust. You mentioned the

2:13

giants. With them,

2:15

you're basically relying on a black box promise. You just have to hope they're

2:19

doing the right thing

2:20

with your security and privacy. You just trust them.

2:22

You trust them. With TwigDrive, the sources show two major pillars. The first one

2:27

is that it's

2:28

open-source. TwigDrive uses something called the AGPL 3.0 license, and this isn't

2:33

just some legal

2:34

footnote, it's the real value driver here. Okay, tell me more about that license,

2:37

AGPL 3.0.

2:39

If I'm not a lawyer or a developer, why should that matter to me?

2:42

It matters because it guarantees transparency. It means the core code is public.

2:46

You can go

2:46

look at it on GitHub right now. But more importantly, the AGPL 3.0 is what's called

2:51

a strong copy left license. Copy left.

2:54

Yeah. And what that means is that if Twig or anyone who modifies the code provides

2:58

it as a

2:59

service over a network, they have to share those changes publicly. It forces the

3:03

whole community

3:04

to keep the core product open. It prevents that slow creep into a closed

3:08

proprietary system.

3:10

I see. So it's a mechanism to keep the open source solution from becoming a closed

3:13

system

3:13

all over again.

3:14

Exactly.

3:15

So let's hit that second pillar you mentioned. Privacy first. How is that different

3:19

from any

3:20

other company that slaps the word privacy on their website?

3:22

Well, this is where the tech details really meet regulatory compliance, which is

3:26

huge for

3:27

professional users. The sources point to specific commitments. Technically, the

3:31

encryption is

3:32

comprehensive. It's not just your files that are encrypted. The entire database

3:38

underneath

3:38

is encrypted too. This means only you and the people you explicitly authorize can

3:43

access your

3:44

data. Without that key, the data is just. It's just noise. And legally, which is

3:50

maybe even

3:51

more important for sovereignty, the commitment is crystal clear. All data is stored

3:56

exclusively

3:57

in France.

3:58

Which matters for GDPR.

3:59

It's massive for European businesses. It puts your data squarely under strict GDPR

4:03

protection.

4:04

Your data isn't subject to the laws of, say, the US or other countries with

4:08

different disclosure

4:09

rules. It's a very deliberate rejection of that legal gray area you get with the

4:13

big cloud

4:13

providers.

4:14

So we have a transparent, fully encrypted file system that follows strict European

4:18

data laws.

4:19

Functionally, the goal is to store all your files securely, whether in the cloud or

4:23

your server.

4:24

But if I'm moving my business, I need more than just storage. I need to create and

4:28

collaborate.

4:29

What's the story there?

4:30

And that's the key, right? Security can't come at the cost of function.

4:34

For real-time document editing, Twake Drive integrates directly with only Office.

4:40

This gives you that familiar collaborative environment, you know,

4:43

tech stocks, spreadsheets, presentations.

4:45

But it's all happening within the secure boundary of your Twake ecosystem.

4:50

Right. And this is where it stops being just a storage tool and becomes a full

4:53

workplace suite.

4:55

The sources really push this idea of a single ID across all the Twake products.

5:01

Absolutely. If we connect this to the bigger picture, the goal is obviously to

5:04

replace that,

5:05

that messy patchwork of tools most companies use.

5:08

You know, one app for chat, another for email, another for storage.

5:12

And none of them are really secure together.

5:14

Right. So this centralized private idea becomes the spine of the whole system.

5:18

Once you're in, you're secure, and all your tools, all your communications,

5:21

they all follow that same high security standard.

5:24

Let's talk about those communication tools,

5:26

because that's often where the vulnerabilities are.

5:28

Let's start with TwikChat, a free and open source messenger.

5:31

In a world with Signal and Telegram and Slack, what makes this different?

5:36

The big differentiator, and this solves a huge real-world problem,

5:40

is a feature they call Bridges. This is just brilliant.

5:43

It addresses the conflict between your internal security policy and,

5:47

well, the reality of working with the outside world.

5:50

What do you mean?

5:50

Internally, you want everyone on secure TwikChat, but your clients, your partners,

5:56

they might be on Discord or Signal or Telegram.

6:00

And that usually means you're sacrificing security by constantly switching between

6:04

apps or...

6:04

Exactly, or managing a dozen different accounts. It's a mess.

6:08

TwikChat's Bridges feature lets you communicate through your secure Twik app

6:12

while sending and receiving messages across those external platforms.

6:16

It brings those outside conversations into your secure space.

6:19

Wow, okay. That's a powerful solution to a very common pain point.

6:23

It bridges the gap between perfect security and operational reality.

6:27

All right, next up, email.

6:29

Twikmail is marketed as the new open source standard for secure, professional email.

6:34

We all know the threats there. Fishing, spam, hacking. How does Twik tackle that?

6:38

They build security right into the architecture.

6:41

For Twikmail, it's two main lines of defense.

6:44

First, advanced encryption, naturally, to keep your email content private.

6:48

But second, and this is critical, an advanced anti-spam shield.

6:52

This isn't just a basic spam filter.

6:54

It's designed to block those really sophisticated threats phishing attacks, hacking

6:59

attempts,

6:59

right at the network edge before they can even reach a busy employee's inbox.

7:04

So it's proactive protection, not just privacy after the fact.

7:07

To round out the suite, we need calendaring and video calls.

7:10

For organization, you've got Twik calendar.

7:13

It's designed to be simple and cohesive.

7:14

It gathers all your different calendars into one place.

7:17

You can color code events, and it's all managed inside that same secure environment.

7:21

No data leakage.

7:22

And then for remote work, there's Twik Physio, a secure video conferencing tool.

7:26

The key here, again, is control.

7:28

The host has really granular controls managing who's muted,

7:31

sending private messages, recording the session,

7:34

and crucially permanently deleting all the associated data when the meeting is over.

7:37

It's about controlling the entire lifecycle of that meeting's data.

7:41

Okay, that brings us to what I think is the most important section,

7:44

especially for anyone concerned with digital sovereignty, control.

7:49

Here's where it gets really interesting.

7:51

We've talked about all this great security, but how do you really maintain control?

7:55

That's come down to deployment flexibility.

7:57

It absolutely does, and this is where it really diverges from the big cloud

8:01

providers.

8:02

Twik does offer a hosted cloud version,

8:06

but the real power for sovereignty is in their on-premise offers.

8:09

This is the key.

8:11

On-premise meaning I run it on my own servers, right?

8:14

But for a small business, doesn't that sound like a huge headache?

8:18

Setting up Docker containers, that sounds like a full-time IT job,

8:22

and it kind of defeats the convenience of just logging into Google.

8:25

That is the essential question.

8:26

It's the core trade-off.

8:28

Control brings complexity.

8:29

Twik tries to smooth this out by making the self-hosting process as simple as

8:33

possible

8:34

for someone with IT skills.

8:35

The sources confirm the main tools, chat, drive, mail,

8:39

can be installed on your own servers pretty easily using Docker.

8:42

So it's streamlined, but not for total novice.

8:44

Wow.

8:44

Exactly.

8:45

But the benefit is profound.

8:47

Your data isn't just encrypted by their standards.

8:49

It's physically on your hardware following your internal security policies 100%.

8:53

You are trading some convenience for total ownership.

8:58

That's a non-negotiable for some organizations.

9:00

So to give our listeners a peek behind the curtain, who's actually building all

9:04

this?

9:04

The development is backed by a company called Linegora.

9:08

The sources refer to them as a major player in French open source excellence.

9:12

So this isn't just a small startup project.

9:14

It's got the weight of an established entity behind it.

9:17

And the tech stack.

9:18

It's built on modern stable web technologies.

9:21

The main languages are TypeScript and JavaScript.

9:24

For anyone interested in the nuts and bolts,

9:26

the development environment uses standards like NoJS, MongoDB for the database, and

9:31

Yarn.

9:32

It's a robust modern stack built for the long haul.

9:35

Okay, that gives us a really complete picture from the legal license all the way

9:38

down to the code.

9:38

It does.

9:39

To just quickly summarize the key takeaways for you.

9:42

Twaik is offering a fully integrated, secure, and GDPR-compliant workplace suite.

9:46

Chat, drive, mail, Vizio, the whole thing.

9:50

Where the user gets the control back.

9:51

Precisely. Through that strong open source license,

9:54

and most importantly, the option for on-premise deployment,

9:57

you get to secure your data on your own terms.

9:59

So what does this all mean?

10:02

It means the technology to challenge the big cloud providers here.

10:05

It's mature, it's stable, it's functional.

10:07

The conversation has really shifted from can open source do this to

10:12

should businesses finally choose a model that prioritizes data ownership

10:15

and transparency over just pure convenience.

10:17

Which leaves us with a final thought for you to chew on.

10:20

If you can get comparable functionality, what is the real trade-off today

10:25

between the undeniable convenience of a single monolithic cloud provider

10:28

and the security, transparency, and genuine control offered by a system

10:34

that lets you manage the software on your own terms?

10:37

That choice is really defining the future of digital business.

10:40

And our sincere thanks again to SafeServer for supporting this deep dive.

10:44

They specialize in helping businesses achieve exactly that level of data control

10:48

by supporting the hosting and transformation needed

10:50

to implement powerful open-source solutions like this.

10:52

Thanks for diving deep with us. We'll catch you next time.

10:52

Thanks for diving deep with us. We'll catch you next time.