It very much depends on the use case. If I was a CIA director having an affair with a biographer, an OTP would seem quite helpful. During our liaisons, we could exchange thumb drives with several GB of randomly generated data from any of a number of reasonably random entropy sources (hardware PRNG works pretty well by itself, but you can throw in EGD and other sources for greater confidence) with some software whitening and the occasional bit of chaff plaintext for good measure. At each exchange destroy any previous pads (and yes, one would have to go to some lengths to ensure destruction without interception, but tossing them in to an incinerator would probably work pretty well).
Now I have a means to communicate over the internet while apart from my paramour without any concerns about the content of the messages being decoded while in transit (compromises at the source or destination are obviously still in play).
Not every crypto problem involves establishing a secure connection party selected ad-hoc without a higher-bandwidth secure channel.
Now I have a means to communicate over the internet while apart from my paramour without any concerns about the content of the messages being decoded while in transit (compromises at the source or destination are obviously still in play).
Not every crypto problem involves establishing a secure connection party selected ad-hoc without a higher-bandwidth secure channel.