responder instead of an initiator, remove empty roles from key compromise protocol.
Add a role that sends out all messages that would occur in a legit run of the protocol including the session key (simulating a previously recorded run with its compromised session key) - Adding a directory to play around with key compromise