@bowner my view is that any closed encryption protocol fundamentally can't be trusted. Even if the algorithm is sound on paper, there is no way to verify that it was implemented faithfully.
At the very least the protocol must be published, and people must be able to write clean room third party clients to confirm that it works as stated. Anything less is a faith based system where you're implicitly trusting the vendor.
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!