guarding data in use is essential as it's prone to data breaches and 3rd-social gathering obtain. In addition, if hackers intercept and compromise the data, they could access the two data at rest and data in https://georgiapvvy218724.luwebs.com/profile