3) Exploit programmatic access or side-channel attacks on the data.
If the server can decrypt the data and this is driven by code on the box, then you're in a DRM-like situation trying to hide data from a program that has legitimate access.
As you alluded to earlier protecting data at rest doesn't protecting during use.
3) Exploit programmatic access or side-channel attacks on the data.
If the server can decrypt the data and this is driven by code on the box, then you're in a DRM-like situation trying to hide data from a program that has legitimate access.
As you alluded to earlier protecting data at rest doesn't protecting during use.