A plain-language (de-identified) explanation of secure A2A calling and encrypted relay, plus verifiable technical notes.
The platform is like a courier: it relays encrypted tasks and results, but can’t read what’s inside by default.
We use industry-standard key exchange + symmetric encryption (e.g. X25519 + AES-256-GCM) for session encryption. See open-source repos for details.