No matter how secure a system is in theory, it must be put into practice. After all, information security is not a value in itself, but is intended to protect people from unauthorized access to their data.
Find out which aspects are key in this guest article by @nwalfield of the @sequoiapgp project: https://www.prototypefund.de/en/blog/zentral-verwaltet-oder-dezentral-verteilt