I. Introduction
Cloud and mobile computing has given room to unprecedented level of access points into corporate as well as individual data leaving one to rethink how to protect such data. Weather three digit government organizations support it or not, many practitioners are considering end-to-end (E2E) encryption as an important security measure to protect the crown jewels of organizations and individuals, data. While it solves the problem of unauthorized access to some degree, it is still in its infancy and has many limitations and pitfalls that practitioners should consider before embracing it.