Again, that's not some theoretical topic. They can block most VPNs, they do so in China, Russia, Iran. And there are no riots on the streets, their corporate overlords don't do anything against it. One of the reasons is that they do allow ipsec for corporate clients. Are you a corporate client? Do you use ipsec for vpn? Are there riots on the streets for this censorship instance?
It's not some theoretical topic, it's the reality for China, Russia, Iran. They do block commonly used VPN protocols, so people now use VPN with obfuscations. Some work, some doesn't, some stop working as time goes. So when people say "Ha-ha, I'll just use VPN", it will help you for some time but the trend is they will make it a problem for you, better start preparing before it happened.
None of this has anything to do with Signal itself, which is as secure as it gets.
Didn't I say that at the start of my questions? What's your point?
server would catch and reject it if it's fingerprints don't match the previously known good copy, or a public version
If I understand you correctly, you mean that Signal app checks itself and sends the result to the server that can then deny access to it? Is that what Signal does and what makes it difficult to spoof this fingerprint?
I don't think you answered any of my questions though since they weren't about Signal.
Now you're just coming up with weird things to justify the paranoia
I'm just asking questions about security I don't know answers to, I'm not stating that's how things are.
As all the sane people do.