...vs cryptographic proof someone had access to your ID card
Which isn't what we are discussing here, this was the point… :)
...vs cryptographic proof someone had access to your ID card