The only metadata they can get from Signal is frequency of messages and the size of the message files. Everything else is encrypted. There's a feature with Signal called Sealed Sender, it makes it so anyone looking at the data being exchanged can't know who messages came from. This means that unless you and your contact are both active targets of the government, they really can't do much with that minimal metadata... Or, at least, nothing they can't do with other options.
Now, if you need total anonymity due to being a whistleblower or something like that, I'd definitely recommend Session instead, as it's anonymous, has almost no visible metadata and is onion routed. It's not great for a daily option, however, thus why Signal is the best option for the average person.
Or @simplex
If people enjoy SimpleX, more power to them, but I just don't find it to be a good experience at this point in time. There are also some valid concerns over its security that I'm also questioning myself.
That said, nothing about it is inherently bad, just not for me haha
Fair enough 😁 Would you care to point me to some security concerns?
The biggest is definitely the fact that a vast majority of its relays are run by the company, which is a for profit company that kinda just showed up out of nowhere. The tech itself seems solid but it's concening to me that the relays are overwhelmingly run by the company.
Also, unlike Session, itd be incredibly easy for governments to set up honeypot relays. If I'm not mistaken, there isn't any onion routing in SimpleX, meaning they wouldn't even need to do a sybil attack to know metadata like your IP.
Thanks, that’s very informative. I saw that @Start9 has a @simplex server package on their marketplace which means other people could run servers. But that is an issue in itself as you state in your second point 🙂
You can run your own relay and that should be pretty easy.
Compare that to Signal where there is only one relay that everybody should use and it's already a honeypot.