Details on redundancy and encryption