Decrypting the security implications of ECH