Comment by godelski

Comment by godelski 18 hours ago

0 replies

  > Impersonation
Yes, but with a canary. Would you rather not have a canary? The other person also receives a warning that the verification number has changed. It's not like the existence of a phone number is what creates the ability to hijack an account. And again, you can do registration locking so that solves that problem.

You can also do verification of your contacts. Best done in person where you can check the keys.

  > MITM attack
I don't think that means what you think it means. Who is in the middle? This is E2EE