> If you're in a situation that requires that level of caution
My thinking is basically that the “harvest now, decrypt later” thing is something everyone should be concerned with. Because it requires way less effort than something like an actual directed attack. Normal people should primarily be concerned with this type of attack (if you could even call it an attack).
> then you should run your own relays.
How does running my own relay solve that problem exactly? How would I then ensure that my messages are not being stored by any other relay? Because doesn’t the protocol assume that messages propagate to other relays as well?