I wouldn't be so extreme. It's reasonable to assume that a properly encrypted connection is secure form entry to exit. You would have to use proprietary tools only at the extremities then, which is actually quite feasible nowadays.
anyway: after learning that not even Osama wasn't even encrypting his shit my view on security is slightly different.
anyway: after learning that not even Osama wasn't even encrypting his shit my view on security is slightly different.