> "Data is as secure as the weakest link in the chain."<p>This can't be emphasized enough. Their main point is they have no good way to fully implement a secure PGP implementation, and the threat models PGP protects against only works if it's implemented correctly.<p>It's a tough problem, and unfortunately PGP itself is not in a state to address it. It's too complicated, and not user friendly. At my job this past summer I tried to implement PGP within our red team in an easy, scalable way so when we proved we could do it, we could roll it out to blue team and eventually to non-IT people to make our organization more secure. The project failed, because there was no easy to use, scalable client that met our needs at the time.<p>When the Thunderbird of PGP comes out, then I'll look into it again, in the mean time I'll hobble along using keybase and signal for secure communications, imperfectly protecting myself from the actors it's meant to protect against.