R39, a somewhat obscure protocol, has been generating considerable buzz amongst specialists in niche areas of secure communications. Firstly designed as a response to handling a specific vulnerability, it has recently undergone major revisions. While never a mainstream system, its distinctive approach to data control makes it appropriate of further