Zero Trace Hub logo
Menu

privacy

Secure Messaging Apps: Signal, Session, SimpleX Compared

Compare secure messaging apps by protocol, metadata exposure, and threat model fit. Signal, Session, SimpleX, Briar, Element, and Wire — honest assessment.

Zero Trace Hub Editorial9 min readUpdated

Secure messaging apps are not interchangeable even when every slide deck claims E2EE. The hard questions are who holds metadata, where servers sit, jurisdiction, and what survives a subpoena. Six options below—honest threat-model fit, no stack ranking by vibe.

Criteria — What Makes a Messaging App Genuinely Secure

Before picking an app, define what you need it to protect against. The relevant criteria, in order of importance:

  1. End-to-end encryption — the provider cannot read message content. Non-negotiable.
  2. Metadata exposure — does the provider know who you're talking to, when, and how often? E2EE without metadata protection is a partial solution.
  3. Server jurisdiction — where the company operates determines which legal systems can compel data disclosure.
  4. Open-source — is the client code audited? Can independent researchers verify the claims?
  5. Identifier type — does the app require a phone number (real-name linkage risk) or allow pseudonymous registration?
  6. Threat model fit — no app is best for every scenario. Match the app to the risk.

For a complete framework, see our threat modeling guide.

Comparison Table

AppProtocolIdentifierServerJurisdictionOpen-source
SignalSignal Protocol (Double Ratchet + X3DH)Phone numberCentralized (Signal Foundation)USAYes (client + server)
SessionModified Signal Protocol (no X3DH)Session ID (random)Decentralized (Oxen Service Node Network)Australia (Oxen)Yes
SimpleXSimpleX Protocol (no persistent IDs)No identifierOptional self-host; decentralized relayUK (SimpleX Chat Ltd)Yes
BriarBramble Transport ProtocolNo identifier; works over Tor/Wi-Fi/BluetoothNone — P2P direct or via TorNo central entityYes
Element / MatrixMatrix protocolUsername on a homeserverFederated (matrix.org default; self-host possible)UK (Element)Yes
WireProteus (Signal-derived)Email or phoneCentralized (Wire Swiss GmbH)SwitzerlandYes (client)

For a deeper dive on Signal vs Session specifically, see our Signal vs Session comparison.

Why We Recommend Signal as the Default

Signal is our recommendation for most threat models — not because it's perfect, but because it's the best combination of usability, verified security, and metadata minimization for most people.

The Signal Protocol has been independently audited multiple times — most recently by Cure53 in 2022. Signal's server-side metadata collection is minimal: as of its 2021 response to a US grand jury subpoena, Signal could only provide account creation date and last connection date. Contact lists, message content, groups, profile pictures, and message timing were unavailable.

Signal requires a phone number. That's its biggest operational security weakness. Your phone number links your Signal account to your real identity unless you use a dedicated SIM or a VoIP number. For users managing a pseudonymous identity, that's a genuine problem. For a journalist's main device communicating with verified contacts, it's an acceptable trade-off.

Signal is a US-based non-profit. US legal demands (NSLs, subpoenas) apply. Signal's architecture means those demands mostly get ciphertext. But Signal could in theory be compelled to log future metadata on a specific account — a targeted surveillance risk that decentralized alternatives address differently.

Why Session Fits a Different Threat Model

Session replaces the phone number with a random Session ID, generated on-device. No phone number. No email. No account registration with a central server.

Session's network routes messages through the Oxen Service Node Network — a decentralized set of nodes using onion routing, similar in concept to Tor. There's no single server to subpoena. No central company with logs of who's talking to whom.

The trade-offs: Session dropped the X3DH key exchange from the Signal Protocol, which means no forward secrecy for the initial session establishment in the same way Signal achieves it. Session's onion-routing network is also smaller and less battle-tested than Tor's. The company behind Session, Oxen, is based in Australia — subject to Australia's Assistance and Access Act (2018), which has mandatory backdoor provisions for "systemic" capabilities. Whether this applies to Session's decentralized architecture is legally untested.

We recommend Session for cases where the phone-number linkage is the primary threat — pseudonymous operations, accessing resources over onion networks, or operating in environments where Signal might be blocked.

SimpleX — No Identifier at All

SimpleX is the most aggressive design choice in this list: your account has no persistent identifier. No username, no phone number, no public key tied to an identity. You share connection links via QR codes or direct URLs. If your device is seized before you share a link, no one else can contact you at all.

SimpleX Chat launched its first stable release in 2022. As of version 5.x (2024), it supports audio/video calls, disappearing messages, and optional Tor transport. It's received an independent security audit from Trail of Bits (2022).

The practical limitation: SimpleX is hard to use at scale and makes group coordination awkward. It's ideal for high-risk, one-to-one contact with a specific source, not for general-purpose team communication. If you're setting up a secure channel for a single journalist-source relationship, SimpleX is arguably the strongest option on this list.

Briar — Works Without Internet

Briar is unusual: it works over Tor, over local Wi-Fi, and over Bluetooth — with no central servers at all. Messages sync peer-to-peer when devices are in range.

That means Briar works when internet infrastructure is down or actively censored. It was used by activists during the 2019 Hong Kong protests and the 2022 Iran protests — scenarios where messaging app servers were blocked. The EFF highlighted Briar as a tool for protest communication for this reason.

Briar's limitations: contacts must be manually trusted and added (no central discovery), and syncing large amounts of history requires the devices to be online simultaneously. It's not a daily driver. It's a tool for specific high-stakes scenarios.

Element / Matrix — Federated, Self-Hostable

Element runs on the Matrix protocol — a federated, open standard that anyone can host. If you run your own Matrix homeserver, you control your metadata. You can even bridge to Signal, Telegram, and other networks.

The default server (matrix.org) is operated by Element and subject to UK law. In 2022, matrix.org was briefly forced to take down a server used by a far-right group following UK regulatory pressure — demonstrating that centralized Matrix hosting isn't immune to legal pressure.

Self-hosting changes the picture. For organizations that need persistent group messaging, history, and integration with other services, a self-hosted Matrix server with Element clients is a serious option. For individuals who want a simple secure messenger, it's more complexity than needed.

Why We Don't Recommend Telegram by Default

Telegram is not end-to-end encrypted by default. Regular chats are encrypted in transit (server to client) but stored in plaintext on Telegram's servers. Only "Secret Chats" use E2EE — and Secret Chats don't support group conversations.

Telegram uses MTProto, a proprietary protocol. It hasn't received the same level of independent cryptographic scrutiny as the Signal Protocol. Security researchers have raised concerns about the protocol design; a 2021 paper from ETH Zürich found multiple cryptographic weaknesses in MTProto 2.0, though Telegram disputes some findings.

Telegram's value is its reach and group size limits. For coordinating large public communities, it's pragmatic. For private communications where E2EE matters, it shouldn't be your default.

iMessage and WhatsApp — Better Than Plain SMS, Not Good Enough for High Risk

Both use the Signal Protocol (or equivalent) for message content encryption. Both have metadata problems:

iMessage is E2EE between Apple devices but falls back to unencrypted SMS when a non-Apple device is in the thread. iCloud backups of iMessage were stored unencrypted until Apple enabled E2EE iCloud backups in late 2022 — and users had to opt in. Apple is subject to US law. Prior to the backup change, law enforcement routinely obtained iMessage content via iCloud warrants.

WhatsApp E2EE message content is genuine. The metadata problem is significant: WhatsApp collects contact lists, usage patterns, and device identifiers that are shared with Meta. In 2021, WhatsApp updated its privacy policy to expand data sharing with Meta, triggering mass migrations to Signal. A 2021 EU ruling found WhatsApp's data practices non-compliant with GDPR.

For most people communicating with family and friends, WhatsApp is vastly better than unencrypted SMS. For journalists, activists, or anyone in a high-risk situation, it isn't sufficient.

Threat-Model Alignment Matrix

ThreatBest options
Mass surveillance / passive collectionSignal, SimpleX, Briar
Subpoena / legal demandSession, SimpleX, Briar (no central records)
Pseudonymous identitySession, SimpleX, Briar
Internet shutdown / censorshipBriar (local), Session (if node network accessible)
Team/org communicationSelf-hosted Matrix / Element
High-risk journalist-sourceSimpleX or Signal (dedicated SIM)
Daily use with mainstream contactsSignal

Frequently Asked Questions

Is Signal safe for journalists?

Signal is a reasonable default for many journalists, but the phone number requirement is a real concern. A journalist communicating with a sensitive source should use a phone number that isn't publicly linked to their identity — a dedicated SIM or a VoIP number. For the highest-risk source relationships, SimpleX or Briar (which require no account at all) are stronger options.

Can Signal be hacked?

Signal's cryptography is sound. The attack surface is the endpoint — your device. If your phone is compromised by spyware (Pegasus, Predator), the attacker can read messages from the screen before they're encrypted. Signal regularly patches vulnerabilities; keep it updated. The Signal app has been audited by independent security researchers with findings publicly disclosed.

What's the safest messaging app in 2026?

"Safest" depends on your threat model. For most people: Signal. For pseudonymous operations where a phone number is a liability: Session or SimpleX. For offline/censorship scenarios: Briar. There's no single answer — define what you're protecting against first.

Does Telegram offer end-to-end encryption?

Only in "Secret Chats," which are one-to-one only and not the default mode. Regular chats and all group chats store messages on Telegram's servers in plaintext. Don't use Telegram for private communications unless you're exclusively using Secret Chats.

Related guides