@rysiek yeah I've read the blog post now and it did indeed clear up some things for me. The idea still *feels* weird but I see some very viable scenarios to use it.
I will definitely still object to people blindly recommending it to vulnerable groups though.
I've often seen: "it's encrypted, free software, and decentralized! You should use it!", being thrown around...and I think you definitely need to understand a) your threat model and b) the cryptographic properties of the protocol and how they map to your threat model.
But to be fair, that's true for any messenger.
One big thing that I could see being a problem for some, for example would be deniability. As far as I understand the protocol, right now we have the exact opposite property: non-repudiation