23Sha-ger At least in the context of GOS and Signal(Molly) with UnifiedPush, the server gets the read receipts after
the distributor ack the server, so in case of ntfy.sh it will add lots of extra ms to the loop.
Yes, but in this case read receipts are completely irrelevant, as delivery receipts will always be sent and can't be circumvented by anything. They are an inherent part of the Signal protocol.
23Sha-ger As for large-scale "scraping" of numbers and their info, that is a problem we cannot solve, it's up to the
platform to mitigate it server-side. But I don't see how it poses an extra risk to an individual.
For some reason I don't think Meta will care about the first point, they are known to cooperate with law
enforcement and will give away anything they have in almost every jurisdiction.
Well, they seem to have implemented some type of rate limiting now, but still not enough to mitigate further scraping, from what I remember. Meta doesn't care and WhatsApp is regularly exploited in all the different ways - from providing an entry point for 0-days, to leaking all your account details to scrapers. It is just inherently dangerous to use.
Ilgar they can figure threema user id by backend, does it affect it?
This research only covers messengers that rely on the Signal protocol (a.k.a. WhatsApp and Signal). I don't know to which extent Threema would be affected, if at all. Currently Threema might even be a better choice, if your threat model includes highly skilled adversaries.