receiving transmission identifying encryption applying available decryption keys processing transmission format: text checking transmission for hazardous content status: trusted tracing neural net ID trusted neural net ID recognized loading neural net avatar playing transmission