Disclosure: The views and opinions expressed here belong solely to the author and do not represent the views and opinions of crypto.news’ editorial.
Every major wave of political repression in the last two decades has followed the same playbook. First, control the media. Then, monitor communication. Finally, isolate people from one another. The tools change, but the vulnerability remains constant: centralized communication systems create centralized points of failure. And in an age where messaging apps have become the nervous system of civil society, that failure is no longer theoretical; it is lethal.
Summary
- Encryption is not enough: Centralized messengers still expose metadata — contact graphs, timestamps, and location data — which authorities can weaponize without ever reading message content.
- Centralization creates single points of failure: Servers can be subpoenaed, hacked, or shut down, turning communication infrastructure into a surveillance map during political crises.
- Resilience requires decentralization: Peer-to-peer and metadata-minimizing systems remove subpoena targets and reduce network visibility, making repression materially harder.
While debates around digital freedom often focus on encryption, the real danger lies elsewhere. Who controls the servers? Who can access the metadata? Who can be compelled to reveal communication patterns? History has already answered these questions.
When communication becomes a weapon
Governments have long understood that silencing dissent doesn’t always require censorship of content. Sometimes, simply knowing who is talking to whom is enough. Very often, detained demonstrators reported interrogators confronting them with printed Telegram conversations, contact graphs, and phone records. In some documented cases, authorities reactivated Telegram accounts of detainees while they were imprisoned in order to monitor incoming messages and identify associates. Even more chilling, accounts belonging to deceased protesters were reportedly brought back online to map activist networks.
Journalists all over the world face imprisonment, or worse, if their communication trails are exposed. Many rely on familiar tools like WhatsApp, Telegram, or even Signal, believing encryption alone protects them. It doesn’t.
Even when message content is encrypted, centralized messengers still generate metadata: who contacted whom, when, how often, and from where. That information is routinely subpoenaed, hacked, or quietly handed over under legal or extralegal pressure. Metadata has led directly to arrests, disappearances, and worse.
In many environments around the world, the existence of communication becomes incriminating.
The forgotten lesson of past uprisings
This is not a new realization. Each generation confronting repression relearns the same lesson: centralized communication fails precisely when it is needed most.
One of the more recent cases has been the Gen Z–led protest in Nepal in 2025, where the government imposed sweeping bans on major social media and messaging platforms, including Facebook, WhatsApp, and YouTube, in an attempt to suppress mobilization and control information flow. In response, protesters adapted quickly. Decentralized and offline-capable messaging tools such as Bitchat, which rely on peer-to-peer connectivity rather than centralized servers, saw increased use as activists sought ways to communicate beyond state-controlled infrastructure.
Without a central service to shut down or monitor, these tools allowed information to continue circulating even as mainstream platforms went dark. The episode demonstrated a recurring pattern: when centralized messengers become pressure points, people are forced to seek alternatives that are resilient by design.
Why encryption alone isn’t enough
The tech industry has trained users to equate privacy with encryption. This framing is incomplete. Encryption protects message content, but it does nothing to prevent:
- Network mapping through contact graphs;
- Identification of organizers through communication frequency;
- Retroactive analysis of relationships after device seizure;
- Legal or covert access to server logs.
For journalists, this means sources can be exposed even if messages remain unread. Communication patterns can be subpoenaed from centralized servers, revealing relationships that no encryption key can hide.
For activists, metadata allows authorities to dismantle movements without ever reading a single message. Leaders, coordinators, and connectors stand out clearly once networks are visualized.
For human rights defenders documenting abuses, centralized storage creates a single breach point where evidence and identities can be compromised simultaneously.
In these contexts, conversation history itself becomes a liability.
The case for decentralized messengers
A decentralized messenger changes the threat model entirely. Without a central server, there is no database to subpoena, hack, or quietly access. Without centralized metadata, communication patterns cannot be easily reconstructed. Without persistent identities tied to servers, networks become opaque rather than legible to surveillance.
For journalists, this means sources can communicate without leaving a trail that can later be uncovered. Not just encrypted content, but hidden relationships.
For activists in repressive states, it means coordination tools that cannot be mapped through metadata analysis. When no central authority sees the whole network, mass arrests become harder to orchestrate.
For human rights defenders, it allows evidence to be shared without revealing who collected it or how it moved through the network.
These systems also address a second, often overlooked threat: coercion after arrest. Features such as self-deleting messages, ephemeral identities, and emergency data deletion ensure there is no historical record to weaponize during interrogation, even if a device is seized or an account compromised. In places where interrogators demand passwords at gunpoint, privacy must be designed for failure.
Convenience has a cost
Centralized messengers dominate because they are easy. They sync instantly, store everything forever, and abstract complexity away from the user. But convenience is not neutral.
Every centralized design decision, such as account recovery, cloud backup,s and contact discovery, creates another surface for abuse. In stable democracies, this is mostly invisible. In authoritarian states, it is catastrophic.
The uncomfortable truth is that many of today’s most popular “secure” messengers were never designed for adversarial environments. They assume good-faith legal systems, independent courts, and limits on state power. Millions of people do not live under those assumptions.
Rebuilding the right to communicate
Free expression is meaningless without the ability to communicate safely. Safe communication cannot depend on centralized intermediaries whose incentives, jurisdictions, or survival may change overnight.
Decentralized messengers are not a silver bullet. They require new mental models, new UX compromises, and new infrastructure. But they align technology with the realities faced by journalists, activists, and dissidents, not with the comfort of Silicon Valley.
The question is no longer whether decentralized communication is necessary. The question is how many more examples we need before we treat it as essential.
Daniel Morosan
Daniel Morosan is a privacy-focused technologist and Director of BD of the Gossip Decentralized Messenger. His work centers on censorship resistance, decentralization, and tools aimed towards a free internet, allowing users around the world to host their content and communicate in a fully uncensorable way.

















English (US) ·