> This setup allows for precise auditing and control, providing clear visibility into who accesses what and when.<p>Yay, tracking.<p>> This adds a layer of security<p>That is assuming that the backend (which acts as a MitM) is secure, obviously. Which is not necessarily straightforward.<p>I stopped reading half-way through, because of a weird feeling... was that AI-generated?