That still only proves your side of the communication. (Which has nothing to do with the encryption scheme, just with posession)
The other side is identified by a phone number. "Don't use your own phone number" is fairly good advice if you engage in interactions that are high-value enough that anybody would both physically obtain a device and deidentify a phone number.
It certainly doesn't make you magically more identifiable than other message exchange mechanisms.
The other side is identified by a phone number. "Don't use your own phone number" is fairly good advice if you engage in interactions that are high-value enough that anybody would both physically obtain a device and deidentify a phone number.
It certainly doesn't make you magically more identifiable than other message exchange mechanisms.