When authorized applications request data, the gateway unlocks using a quorum-based mechanism. The gateway root secret is reconstructed, gateway keys are derived, and only then can frames be decrypted and reassembled. Without proper quorum authorization, stolen frames remain permanently unusable.