
Technology (and mathematics) can obstruct this suggestion.....
......with a peer-to-peer messaging application using Diffie-Hellman. In such an application:
(1) The heavy lifting would be done on the peer device.
(2) The encrypted message would be saved as it traversed the network.....but....
(3) ....only the D/H tokens would be visible, and these would have nothing to do with....
(4) ... the different random secret key used to encrypt/decrypt each message, and then thrown away
Net, net....no persistent keys....only encrypted messages in corporate backups!
Of course, if any of the peers were to save DECRYPTED messages, then, of course the game is up...........
.....unless the application forces the deletion of those as well...........
P.S. Even with 60,000 bit primes in use by D/H, the messaging takes less than a second per message at each peer!!!