endpoint encryption vulnerabilities and exploits