<quote>“So you decided to encrypt the giant database at rest – but you have automated queries coming in from other systems, all day."
“All those other systems have copies of the keys – you have copies of the keys all over the place. It's hardly any different to the data not being encrypted.”</quote>
Heh, the same argument as used against backdoors. All those keys sitting around just waiting to be extracted and exploited.