Wdym anti features? The only thing fdroid does is take the developer APK, sign it themselves and release it. If any anti features exist (I assume you're talking about the anti features tab in the fdroid app) it won't make any difference where you obtain it as fdroid doesn't do code checks. They only check to make sure it's under a open source licence. Fdroid adds no protection to any apps and you trust them to ship clean packages. If you get packages from the developer and they sign it and it happens to be malicious it's only one app instead of all your apps you have from fdroid. You trust them a lot and I'd recommend reading this if anyone is interested. https://privsec.dev/posts/android/f-droid-security-issues/
The main issue with encrypting the database using Molly's setup is you'll miss notifications and calls until you unlock, this might be able to be fixed using a different database encryption setup but as it stands it would be inconvenient for many.
Signal on the Google play store isn't FOSS but it facilitates the delivery of notifications to the user. The protocol itself is open source and notifications are handled securely even with Google play services on the phone. If you want a FOSS version, use the APK on their website, it has an auto updater.
Molly is only available on Android, as far as differences it is a hardened fork of signal with an encrypted database, what that means in practice is even if someone was actively probing your phone to try to gain access to messages they wouldn't be able to due to the encryption. It's very useful if you are an active target or you don't trust your phone os to play nice. I personally use it myself and really like it but in general it's not terribly different.
I don't see an issue as signal is designed not to trust the server. Signal also uses sealed sender and Perfect Forward Secrecy, which is something almost all e2ee messengers lack. What it means in practice is signal leaks very little if any metadata, if you leak metadata you give away details about who your talking to and for how long, etc. Examples might include talking with a suicide hotline, or a doctor, maybe a customer service agent at a company and for how long. Those details will give a lot away about you, even if the messages or calls themselves are encrypted. Matrix is not recommended for communication because it fails to properly hide metadata and actively trusts the servers. When you make a call on signal, as long as both users have "Always Relay Calls" set to disabled, your calls will be peer to peer instead of trusting a central server to facilitate the connection and trusting a middle man. What this means is since the connection is peer to peer you can leak your IP address to the user you're talking to, however a VPN fixes this issue.
Once again, I'm still trying to figure out how apple users can defend this. Yes, Google maps had this feature, but everytime I talk to apple users I'm always told they got their phone because "it just works!". But then I learn that features I consider basic at best are completely missing. If my iphone should "just work" I expect the features I want to exist without another app installation. Things on iphone only seem to work if you don't know anything better.
I hate to say this, but this is a blessing in full view. If people want the "freedom" to not take a vaccine because "risks, 5G mind control, whatever" then let's let them. Life is full of risks and they need a wakeup call.
I feel like Google has two departments internally, a security research and implementation team and a Google ads team. One of them betters security for all android users and another gets bad press for making bad decisions with YouTube, chrome, or other Google services. I'd love to know how the culture is at Google. It's not like security conflicts with Google data collection practices but I still find out interesting to think about nonetheless
Samsung in terms of security, privacy and hardware is a total mess. I would avoid Samsung products at all costs.
Printers print very small dots on the sheet of paper you print so it canbe identified. https://en.wikipedia.org/wiki/Machine_Identification_Code
This makes me wanna get my Sony DSLR and start taking photography lessons again, this is awesome!
As far as it being against signals tos, molly exists and had not received any problems from the signal foundation to my knowledge, discord has the same clause and they don't seem to give a rats ass. Sure they could enforce it but they don't, and personally with how matrix clients are handled they have mixed security, fluffychat has security issues ranging from outdated SDK versions to quite literally ddosing homeservers because of a non-existent rate limit.
The crypto stuff wasn't great but you know what's cool? You don't have to use it. Simple as that. You don't have to engage with it and you and I both know that. It's buried in settings and you have to find it yourself.
Signal is not an anonymity tool, and has never been advertised as such, if you need anonymity, signal is not a good choice. You can make it more anonymous by using a burner phone but that's a different topic.
If everything is encrypted, what could Amazon tap? You do realize sealed sender and PFS take away any trust from the server correct? It's all encrypted, your aren't trusting the server at all, it's completely trust-less, and unless you think Amazon or governments can at this very moment tap any encrypted data and decrypt it, I would recommend taking a walk outside and realize that no one, NO ONE can decrypt current encrypted standards.
Unless you can point me to a reputable article showing in great detail that signal is lying about their e2ee claims then I'll rest my case. Signal has been proven time and time again to not have any data on their users except the minimum required for the service to work, that's called integrity.
Also there will always be someone you trust on the internet, nothing will change that unless we completely rethink how the internet works.
Edit: added quotes Edit 2: added extra info