@session I appreciate the time you took to check the claims of the security researcher. I appreciate the thoroughness of these checks.
I appreciate the ability of @soatok to admit he was wrong on some accounts.
However, I firmly condemn the pejorative tone Session uses to speak of the author of that research, calling him "a blogger" and denying to cite his writings, no matter how derogatory his own tone was about your product.
To be fair, even if it happens that none of the claims result in immediate security flaws (as far as I understood them), several concerns do sound like the protocol design is "baroque" and would deserve some formal proof.
For one, I am still not convinced the removal of PFS is justified, and I am not convinced that the reduction of the seed size for UX reasons is a valid justification. I blamed Signal for the same thing a few years ago when they truncated the hash of the session key from 256 bits to 100 bits **in the qrcode verification procedure**. And it was about a hash truncation; not the seed!