Post-quantum protocols. Post-quantum secure protocol variants based on KEMs have been proposed for TLS 1.3 [70] and WireGuard [42]. These protocols, unlike Signal, allow (multiple) round trips and therefore do not experience the same problem we discuss in this paper. For Signal, Alwen, Coretti, and Dodis [2] give a first variant of Signal's double-ratchet that is amenable to post-quantum secure KEMs, however exclude the crucial initial key agreement. Duits [33] explores transitioning Signal to the post-quantum setting; the suggested replacement of DH with Supersingular Isogeny Diffie-Hellman (SIDH) [44,19] however is not secure under the required key reuse, as we discuss next.Key reuse with LWE and SIDH. There are a number of attacks on lattice-based key exchange schemes when keys are reused [35,22,26,59,24,67,5,25,40,62]. There exist proposals to enable secure key reuse in (R)LWE-based schemes [39,23], however, these proposals only seem to at most guard against specific attacks at a time, while still being vulnerable to other attacks. All LWE-based KEMs in Rounds 2 and 3 of the NIST process rely on the Fujisaki-Okamoto transform