Key Management
Cryptographic keys are used at every interface - between nodes to establish identities, to decrypt received data, to encrypt data before transmission, to encrypt data before storage, to decrypt data read from storage, etc. It’s critical that all other components are properly structured around safe key management, so this will be one of the first components developed. Key generation Every user generates a root key that serves as the ultimate recovery key, which is used to bootstrap their cluster....