Try switching between the tabs to simulate how both sides of a secure peer-to-peer verification works