Now all keys are encrypted when they're not in use to thwart cold-boot attacks. Furthermore, all unlocking messages are sent in bulk to avoid fragmentation and improve performance.
All the methods are implemented to get the vaulted key database running, but it's not in use yet.
We can now generated a vaulted key database from the key database and cleanse the original key data.