privacy
Signal vs Session: Which Messenger Fits Your Threat Model
Signal vs Session compared honestly: phone number vs Session ID, centralized vs onion-routed servers, and which threat models each one actually fits.
Signal vs Session is the privacy comparison readers bring already formed. Both get the cryptography broadly right; the real split is metadata, identifiers, and infrastructure. Signal stays the default pick for most people; Session fits where a phone-number identity is the liability. Below is exactly where that line lands.
Signal at a Glance
Signal is a non-profit, open-source messaging app built on the Signal Protocol — the Double Ratchet Algorithm over X3DH (Extended Triple Diffie-Hellman). The Signal Protocol provides forward secrecy (each message uses new keys, so past messages are safe even if future keys are compromised) and deniability. It's been independently audited multiple times; the most recent comprehensive review was Cure53's 2022 audit, with findings published publicly.
Key Signal facts as of 2026:
- Identifier: Phone number — required at signup and used to find contacts.
- Server infrastructure: Centralized, operated by the Signal Foundation in the USA.
- Metadata: Minimal. Signal has been subpoenaed multiple times; it's only been able to provide account creation date and last connection date. Contact lists, group memberships, and message timing are not stored.
- Jurisdiction: US law, including NSLs (National Security Letters) with potential gag orders. Signal's architecture means most legal demands yield nothing useful.
- Group size: Up to 1,000 members.
Signal's biggest practical limitation for privacy-conscious users: the phone number requirement links your account to a real-world identity unless you use a dedicated SIM or VoIP number purchased without your real name.
Session at a Glance
Session is built by the Oxen Privacy Tech Foundation in Australia. It started as a fork of Signal in 2019 and has diverged significantly. Session's defining feature is that it removes the phone number entirely.
Key Session facts:
- Identifier: Session ID — a random 66-character hexadecimal string generated locally. No phone number, no email, no registration server.
- Server infrastructure: Decentralized Oxen Service Node Network — roughly 1,700 nodes as of early 2025, operated by independent node operators who stake Oxen tokens.
- Metadata: Routed through an onion-routing layer within the Oxen network, similar in concept to Tor's onion routing. No central server sees both sender and recipient.
- Jurisdiction: Oxen Foundation (Australia) — subject to Australia's Assistance and Access Act (2018). Whether this Act applies to Session's decentralized node architecture is an open legal question.
- Protocol changes: Session dropped X3DH from the Signal Protocol (key agreement happens differently, without the pre-key server infrastructure). This affects how sessions are established but doesn't eliminate E2EE.
Session groups can hold up to 100 members in standard groups, or up to 9,999 in "community" (open group) chats — though open group chats are stored on a community server and don't have the same privacy properties as one-to-one messages.
Phone-Number Identity vs Session ID — the Trade-Off
This is the core question. Your phone number is a globally unique identifier linked to:
- Your real name (via carrier registration in most jurisdictions).
- Your billing address and payment method.
- Any services you've registered with that number.
- Historical call and SMS records held by your carrier.
If a government agency wants to identify a Signal user, the phone number is the first pivot point. Signal can't stop a carrier subpoena. Signal can't stop a threat actor who already knows your phone number from confirming your Signal account exists.
Session's Session ID has none of that linkage. A fresh install on a new device generates a new Session ID with no connection to any existing identity. For pseudonymous operations — managing a separate digital identity, communicating as a source without revealing who you are — this is a significant structural advantage.
The flip side: finding people on Session requires exchanging Session IDs out-of-band. There's no "search by name" or contacts sync. That friction is intentional, but it makes Session impractical as a general-purpose messenger for everyday contact with people who use their real names.
Server Architecture — Signal's Centralized vs Session's Onion-Routed
Signal's servers are a known, addressable target. Signal Foundation operates them in the US. Governments can request metadata about accounts, attempt traffic analysis, or target the servers with attacks. Signal has resisted these well — but the servers exist, the foundation has a known address, and the legal pressure is real.
Session's nodes are operated by ~1,700 independent operators globally. No single server has complete routing information. Compromising one node reveals only one hop in a three-hop onion route. There's no central registry to subpoena for "who talked to whom."
This decentralization comes with reliability trade-offs. Session message delivery can be slower than Signal, particularly for groups. The network size (1,700 nodes) is smaller than Tor (6,000+ relays), meaning the anonymity set is comparatively limited. And because nodes are economically incentivized (via Oxen token staking), node behavior is influenced by economic conditions — a dynamic not present in Tor's volunteer model.
For network-level anonymity beyond what Session provides, route Session traffic through Tor Browser — Session doesn't prevent you from using Tor as a transport layer.
Threat Model — Who Should Pick Which
Choose Signal if:
- Your primary threat is content interception — you need verified E2EE with a well-audited protocol.
- You're communicating with real-identity contacts who won't use pseudonymous tools.
- You use a dedicated phone number not linked to your real name.
- Your adversary is a company, a passive surveillance system, or a low-capability actor.
Choose Session if:
- Your phone number is itself a liability — you're operating pseudonymously and can't afford the identifier linkage.
- You need messaging that avoids a centralized server that could be targeted with legal demands.
- You're concerned about traffic analysis revealing communication patterns.
- You're operating under a threat model that includes OPSEC compartmentalization.
For the highest-risk threat models — a source communicating with a journalist under nation-state surveillance — neither app alone is sufficient. Combine with Tails OS, hardware that isn't linked to your identity, and a full threat model that accounts for endpoint risks.
For a broader comparison including SimpleX, Briar, and Element, see our secure messaging apps guide.
Frequently Asked Questions
Is Session as secure as Signal?
Session's E2EE is sound. It uses a modified Signal Protocol and has received independent security review. The key differences are: Session dropped X3DH for session establishment (a design trade-off, not a vulnerability per se), and Session's onion-routing network is smaller and less established than Tor. For content confidentiality, both are adequate for most threat models. For metadata protection, Session's design is stronger. For cryptographic audit history, Signal has more.
Does Session work without an internet connection?
No. Session requires internet connectivity — unlike Briar, which can route over local Wi-Fi or Bluetooth. If internet availability is a concern (protest scenarios, censored networks), Briar is the better tool.
Can I use both Signal and Session?
Yes — and many privacy-conscious users do. Signal for regular communications with trusted contacts, Session for pseudonymous contexts where phone-number linkage is a risk. They serve different use cases and aren't mutually exclusive.
Is Signal safe in countries with restrictive internet laws?
Signal has a built-in censorship circumvention mechanism — it can route through a proxy when direct connection is blocked. It also supports being tunneled through Tor Browser on desktop. In countries where Signal is actively blocked (Iran, China at various points), these mechanisms matter. Session's decentralized node network provides some censorship resistance by design, though specific nodes may still be blocked.