Does it matter how the message is exposed? It's always possible that the recipient is compromised, through no fault of my own or the tech involved... Insecure key storage, for example.