Not to mention, of course, that GPG requires
- both parties to use it, not just the one who is knowledgeable and concerned about privacy
- both parties to authenticate one another’s public keys offline (or through their web of mutually trusted GPG users. hm. hmhmsneRT. hmhmfffhahahHAHAHAHA. Ha. Hoo, boy)