What you list is only valid if all the nodes in the network have the
qualities you listed.
Suppose you have:
- node A (perfect clean ultimate libre)
- node B (containing spyware)
A sends encrypted message to B. The spyware on B decrypts everything because
it steals B's private key. So what good is A's perfectly secret private key?
- Nobody cares about it or its secrecy because the info you transmit has been
hacked through the other node.
That's the big fuss (to my mind).
(of course you know all that)