When end-to-end encryption is implemented, which area is most vulnerable to exploitation?
A. cryptographic key exchange
B. endpoint security
C. cryptographic key generation
D. security of data in transit
When end-to-end encryption is implemented, which area is most vulnerable to exploitation?
A. cryptographic key exchange
B. endpoint security
C. cryptographic key generation
D. security of data in transit