1 min readAug 16, 2019
One of the bigger problems in enterprises and generally large distributed setup is key management. How does the receiver get the secret key in the first place? How do we manage policies around keeping keys secret?
Could you highlight some of the prevalent industry practices in this regard.