

It sounds like you’re contradicting yourself now. You’re right, signal is more secure because its source code is open-source and auditable. So what’s the issue? It seems you’ve been arguing otherwise, and you’re just now coming around to it without admitting that you were wrong in the first place.
The client-side app is also open-source and auditable, and you can monitor outgoing traffic on your devise to see whether the signal app is sending data that it shouldn’t. It sounds like people have verified that it doesn’t do that, but if you don’t want to take their word for it then why don’t you see for yourself?


Is that vulnerable to an attack if a hacker gets their public key and intercepts the data traffic? Or can it only be used to encrypt but not decrypt?
Or are the added layers of complexity designed specifically to prevent that from happening?
This is why I like open-source, because people who know more about it than I do can check everything over and say whether it’s good.