Next step, Chinese intelligence hacks their database of verified phone numbers. Anonymity over. Having the resources of a nation state, they could probably do it easily.
If they were doing E2E encryption, that would not be a problem. Broadcasting to find the right recipient (the one with the decrypting key) but contents protected from everybody else.
If you can meet once physically, there is nothing better than that to exchange your public keys. That's why hackers meetings are "public keys signing parties".