This provides hackers and insiders with repeated opportunities to exfiltrate unencrypted data. Today, files are often encrypted in transit and at rest, but decrypted while in use. The common methods of storing and sharing sensitive data with colleagues and partners have weak links. It was no small feat to synthesize 11 years of top-notch cryptography research into a streamlined developer experience that is accessible and freely available to anyone in the time most people would spend to brew a pot of coffee or de-clutter a desk. In fact, developers with basic platform tool familiarity can get up and running by following a few simple instructions rather quickly (see video below). That was until today thanks to a new toolkit we are making available for MacOS, iOS and soon for Linux and Android. The main difference is that FHE requires a shift in the programming paradigm that we are used to, which makes it a little more difficult to integrate into applications. Half-kidding aside, FHE really sounds like magic when you hear about it for the first time, but it’s actually based on very sound mathematics. Often, when I begin explaining fully homomorphic encryption (FHE) to someone for the first time I start by saying that I’ve been working in the field for nearly a decade and yet, I still have to pause to spell it right.