R39, a somewhat obscure protocol, has been creating considerable attention amongst experts in certain areas of protected communications. Initially designed as a solution to handling a concrete vulnerability, it has lately undergone substantial revisions. While not a mainstream technology, its unique approach to data handling makes it worthy of more