R39, a somewhat obscure protocol, has been generating considerable attention amongst specialists in specific areas of protected communications. Firstly designed as a response to tackling a particular vulnerability, it has recently undergone substantial revisions. While not a mainstream technology, its peculiar approach to encryption handling makes