The near futility of encryption key management