Peer Verification process
After the connection handshake the human handshake needs to happen we mark the old and new keys when they are used for messages
Example
Async Distributed Key Verification including conditional overtime mutation Archives the goal of Ultra High Security applyed async out of band does not effect core throughput of data Is able to verify and discard or quarantäne data.