Consider communication over a lossy channel in the presence of an eavesdropping adversary. We explore the limits of secret communication in such a setting and show how erasures and feedback helps to increase secret message rate. A two-phase protocol design is introduced, which first creates secure keys and then uses the keys in an efficient way for sending encrypted message in the second phase. This concept, combined with different key generation techniques achieves capacity in a variety of settings including broadcast and network scenarios. Our converse results use novel proof techniques with a potential of broader interest.