cryptographic safety features that can be used to determine the one that owns the proof (this involves evidence with cryptographic chips and digital accounts which are secured by cryptographic techniques)ensure the evidence is valid or Look at the evidence hasn't been cancelled, shed or stolen confirm any Actual physical security features are legit