@tcely @Pabamiti also it should be noted that the entire point of the way Session routes your messages through three (iirc) nodes is so that no single node knows both the source and destination of your message, as well as no node having access to the message itself. So you can only even have your metadata (sender and receiver) compromised if all three of the nodes your message randomly chooses to route through are compromised, which is an absurdly low probability given the thousands of nodes to choose from. It works the same as the Tor Onion network, and Tor is literally the gold standard for this kind of thing, and has the same "problem" of the owners of its nodes not being known. Which, as has already been pointed out, is actually a good thing.