I understand, but its all about framing. “What does it Mean to be A Signal Competitor”, well that is chat apps as that is the space signal occupies. That might not be what space it occupies to you, but that is the space it occupies. “What does it take to compete with Signal’s Security” frames the argument to one component, and I would probably have a very different response to that framing. Because of the framing, your argument comes across as “don’t talk about use case, its not worth my time.” I understand this is because your focus is the cryptographic security, but threat modeling and Human factors has to be a consideration of an overall security posture. Congratulations, you have the best cryptography, but if its not usable, the cryptography doesn’t matter, if the users are the weakness, the cryptography doesn’t matter, if nobody is willing to use it because its missing a key user feature, the cryptography doesn’t matter.
I know enough about cryptography to know to leave it to the experts. I know about hardware power side channels, I know several exploits have been implementation based and not cryptography based, and I know vulnerability does not always mean an exploit
The framing is as follows:
Matrix, OMEMO, whatever.
If it doesn’t have all these properties, it’s not a Signal competitor. It’s disqualified and everyone should shut the fuck up about it when I’m talking about Signal.
That’s the entire point of this post. That’s the entire framing of this post.
If that’s not personally useful, move on to other things.
I understand your point of view, but whether you like it or not, your title will be viewed as the framing. “What Does It Mean To Be A Signal Competitor?” At a surface reading, it seems to me what that means to you is very different from what that means to others.
I assume you probably wrote it along the lines of “What does it mean for an E2E encrypted protocol to compete with Signal on a technical level”
Others read it as “what does it mean to compete with the signal app” and there is no additional depth to security.