Comment Choose protocol before choosing implementation (Score 1) 30
An adversary can coerce a proprietary software producer to compromise the code. That's what we're going to see here.
An adversary cannot time-travel to when a protocol was invented, and compromise the protocol. (Though I guess the NSA can come kind of close to that, by "helping" as it's being developed, w/out the time-travel part.) That's what we're not going to see here.
Ergo, proprietary apps will remain unable to provide secure messaging, but secure messaging will remain available to people who want it.