“Keys can be stolen or hacked”. Assuming that an adversary gains access to your user account on your local computer? Well, there is no messaging protocol that will “protect” you and your data when an adversary has unrestricted access to your user account.
I am not sure for whom this article was written. “It’s hard to exchange keys” is Computer Security 101. That’s how public-key cryptography without a centeralized PKI works. The only valid argument against PGP I could recognize here is the fact that PGP provides no forward secrecy.
“Keys can be stolen or hacked”. Assuming that an adversary gains access to your user account on your local computer? Well, there is no messaging protocol that will “protect” you and your data when an adversary has unrestricted access to your user account.
I am not sure for whom this article was written. “It’s hard to exchange keys” is Computer Security 101. That’s how public-key cryptography without a centeralized PKI works. The only valid argument against PGP I could recognize here is the fact that PGP provides no forward secrecy.