Those require identity systems though. Rely on who you are, no who you’re not.
Hmm, yeah. So when you say alibi.. maybe a user could be in control of certain logs of their own activity that they are able to yield limited access to?