... with the endpoint, and the communication protocol is https. In other words, there is no risk of leakage of cKey because the communication is encrypted. However, if you want to use encryption to protect your key locally, you can encrypt and store your key and decrypt the key before calling ...