Don't talk about illegal things (abortion in certain places, DIY HRT, etc) on facebook messenger. Don't do it on whatsapp or via SMS or Instagram DMs or Twitter or Mastodon or Discord or whatever.

Use signal. Use a PIN on signal. Turn on auto-destruction of messages. If your data is not fully end-to-end encrypted, that data can and will be handed over to police and it will be used to prosecute you.

@ieatkillerbees honestly use session, even if they somehow got a hold of the messages it hard to grab the origin of them
@ieatkillerbees I know people hare on it cause it has proof of stakes model to prevent the feds from taking over 90% of the network but it is still very private
@skymtf @ieatkillerbees what are you guys thoughts on matrix then. Also I've never heard of session, going to look into it.
@oceaniceternity @ieatkillerbees matrix will hide the contents of your conversation but not a ton of meta data, like they 100℅ prove a conversation happen between two people. Session hides this pretty well.
@oceaniceternity @ieatkillerbees signal in terms of meta data is the same, I guess matrix could protect you from charges on abortion but likely not in cases where they just need to prove you talked to someone
@skymtf @ieatkillerbees Unfortunately, I'm not certain how well encryption would help you in a court of law given Key Disclosure Laws exist: https://en.wikipedia.org/wiki/Key_disclosure_law
Key disclosure law - Wikipedia

@oceaniceternity @ieatkillerbees depends, most communication encryption provides deniability, like session provides not only zero metadata. If I were talking about it I would also use disappearing messages. Secondly at least in the US you can be forced to disclose information to incriminate yourself. Also even device encryption in some cases provides two ways to decrypt the data
@oceaniceternity @ieatkillerbees so like fake data etc
@skymtf How does it get around the necessity of metadata for routing, i.e I understand metadata as "this packet needs to go to this destination"
@oceaniceternity so session works similar to Tor in the nature they know you connected but not much else. only the last node knows the destination and only the first node knows who the sender is.
@oceaniceternity the oxen network functions really simularlly to the tor network other than you need to put stake in before you can operate a node(cypto shit)(kinda makes sense after reading the whitepaper on a common attack for tor which is to just host so many nodes you can pretty much log an entire circuit