That’s crazy! When I was last trying to run Linux full time in ~2014, you had WINE and then a commercial version of WINE (not by the WINE devs, but because WINE is licensed the way it is and is open source…) that would run a few more things, but I don’t remember what it was called.
So glad to hear it’s progressing this quickly and far.
Session was at first a fork of Signal without usernames.
Now by design it uses their own custom tor-like service (instead of just… using tor) and does not support forward secrecy or deniable authentication, so anyone who collects the messages in transit can either find a vulnerability in the encryption scheme, or spend enough GPU resources to crack it, and they have confirmation of who sent and received the message and what the contents of the message are. And is headquartered in Australia, which is 5EYES and much more against encryption than the US. Oh, and the server is closed-source.
Regarding Australia’s 2018 bill…
Regarding the ‘vulnerability or cracking them later’ bit…
From Session’s own FAQ:
I wouldn’t touch it with a 12ft ladder.