Slide 33
Slide 33 text
@vixentael
If E2EE is so great, why we don’t use it everywhere?
TLS
FS/OS
encr,
TDE
custom data-at-
rest encryption
ALE
E2EE
security
efforts,
tradeoffs
key storage,
key rotation, key
revocation,
data re-encryption,
consistency, backups,
tying keys w/ identity,
search in encrypted data,
logging monitoring,
and all the NIST SP
800-57, 800-53.