You are confusing privacy with anonymity. You aren’t anonymous because your user is linked to a phone number, but your communications are private due to how their encryption works.
On the location attack: it is a matter of configuration and your location will be as ambiguous as thousands of miles.
Precise language is important if you want to understand and communicate truth. It helps a lot to understand the difference between privacy and anonimity there is a scenario where a person doesn’t care that an adversary knows their id, but does care about the content of their messages. In which case, differentiating tools that provide that particular service requires language to discuss it.
You are correct… Official narrative is that it helps reduce spam and bits which could be a reason… But phone numbers linked to real ID allows spooks to maintain their surveillance regime. They get the relationship maps, if they deem you a threat, they will use Israeli spyware to breach your device and get the content
You are confusing privacy with anonymity. You aren’t anonymous because your user is linked to a phone number, but your communications are private due to how their encryption works.
On the location attack: it is a matter of configuration and your location will be as ambiguous as thousands of miles.
Finessing the terms does not stop them demanding a phone number.
Precise language is important if you want to understand and communicate truth. It helps a lot to understand the difference between privacy and anonimity there is a scenario where a person doesn’t care that an adversary knows their id, but does care about the content of their messages. In which case, differentiating tools that provide that particular service requires language to discuss it.
Clearly, they do care about the phone number.
You are correct… Official narrative is that it helps reduce spam and bits which could be a reason… But phone numbers linked to real ID allows spooks to maintain their surveillance regime. They get the relationship maps, if they deem you a threat, they will use Israeli spyware to breach your device and get the content
They are right. Terminology is important in this discussion.