is not any different from just having TLS for transport
Yes, in simple terms, all encrypted transfer protocols are similarly protected from mitm attacks.
That just means that they store both your data in some encrypted way and the key. They can still read it trivially.
They can and they said the decryption keys are always kept separately (there are probably more layers than I can describe) from the data to make sure the servers are not used to decrypt the data locally. They can be lying for all I care. The bigger problem is that people somehow assume this a huge threat, while all previous cases didn’t involve anything like that. People are getting into trouble for their public content - protected by some encryption but visible to anyone interested (who then report it to oppressive authorities).
While some go extra mile to explain to you how you should use e2e for your family group chats, real criminals do their stuff everywhere (especially on telegram) for years, staying safe. Problem is not how weak or strong the encryption is, but that once you are under oppression and do opposition activities, you’re going to learn by yourself how to deal with it. Signal will not save you from people in your group chats if they are there to report on you.
There is no logic here. If it was poor it would be very easy to track anyone including criminals. You can check the news to find the reasons.
I meant telegram related cases.
I didn’t see any proofs of that.
Part of what? I don’t get the point here.