Beyond Encryption: How To Securely Implement And Audit Microshard Technology