By using phone numbers as IDs signal can rely on your phone's local contacts (meaning they don't have to send your social graph to their servers). This way they can keep very little metadata on you.
There's pretty much nothing for them to turn over except the fact that your phone number has the signal app.
Most of the other secure apps could turn over your entire contact list (which could be damaging for people in a protest that are being targeted).
Confirming a single phone number has the app is not nearly as big of a deal (I'd argue it doesn't matter at all).
There's nothing inherent in phone numbers here. Both iOS and Android also allows you to add e-mail addresses (and other identifiers) to your local contacts. I'm yet to hear an argument as to why e-mail addresses or other identifiers can't be used in addition to phone numbers, or why it would be a complicating factor.
I think they are working on non-phone number IDs though (Moxie was in an earlier signal thread on HN recently and mentioned it).
It will take the authorities a bit more time (i.e. someone throws away their burner phone and authorities hack it)(with the assumption that phone numbers/SIM activations are provided using valid ID as it happens in many countries).
But that doesn't help much if the entire contact list is a list of trash mail adresses (in the case of Wire) or a list of random IDs (in the case of Threema). And at least Threema does not store any information about your contacts on their servers.
Can you obtain a phone number without any ID in the US? Because you can't in large parts of Europe.
https://en.wikipedia.org/wiki/Global_surveillance#Infiltrati...
Edit: And that from netzpolitik (highly trusted german source) under 'A global passive adversary' that's the interesting part: https://netzpolitik.org/2017/secret-documents-reveal-german-...
Yes. About 10 years ago, before Google Voice, I needed a local area-code number to work with my apartment buzzer. I bought a $15 Tracphone with cash at Walmart and activated it at a payphone (mainly just to see if I could).
There is also I2P network, which is even harder to break (unless someone owns practically all nodes there).
And no you can trace it thru the ISP's, the problem is the latency, Connection from here to there in that millisecond trace one...and so on.
Edit: GnuNet, RetroShare and ZeroNet should also be mentioned
If it’s the latter, I suspect that won’t happen in practice for the majority of users.
I haven’t heard of threema, I guess users have to share their IDs manually with each other in that case?