if the keys are destroyed, how can one fancy to break them? There might be something I didn't catch on the way?
That's the whole idea. The paired keys are created when the conversation begins and discarded when the conversation ends. From the article:
After the session is complete, and both parties destroy the session keys, the only way to decrypt the communication is to break the session keys themselves. This protocol feature is known as forward secrecy.
That is,
IF the application which is using the Diffie-Hellman paired key erases the keys that were created at the beginning of the conversation. There can be more than one participant in the conversation, but any conversations recorded would be encrypted. The recorded conversations cannot be decoded without at least two of the cipher keys.