For example, if during a conversation one of the clients attempts to transmit explicit content (e.g., video) to another client, one of the entities may determine that authentication of the receiving entity is needed to determine if the receiving entity is allowed to receive such material.