The NSA and GCHQ likely have corporate spies who access the private keys, and thus can decrypt things signed with those keys.
You're still safe with many forms of encryption (OpenVPN, perfect forward secrecy, etc).
You may not know how to configure such stuff, but just accept that the people who make OpenVPN, and even Google's Gmail encryption do know this stuff.
By using encryption routinely, when the strong stuff exists you'll be using it.
If you abandon encryption, you'll have nothing.
In many ways, whilst weak encryption is weak and is broken, the strong stuff is really good, not broken (mathematically) and even with a private key an attacker would only have the start of a piece of communication.
Encryption works.
The NSA and GCHQ likely have corporate spies who access the private keys, and thus can decrypt things signed with those keys.
You're still safe with many forms of encryption (OpenVPN, perfect forward secrecy, etc).
You may not know how to configure such stuff, but just accept that the people who make OpenVPN, and even Google's Gmail encryption do know this stuff.
By using encryption routinely, when the strong stuff exists you'll be using it.
If you abandon encryption, you'll have nothing.
In many ways, whilst weak encryption is weak and is broken, the strong stuff is really good, not broken (mathematically) and even with a private key an attacker would only have the start of a piece of communication.
Hold your nerve, encrypt all the things.