triggers after a predefined threshold of iterations. This protocol ensures that all training data is securely stored on a publicly accessible server, gives the public in source code to the program. It is safest