There are two encryption approaches that satisfy Schrems II.