In Axiom’s imaginative and prescient, ZK proofs shall be used for such authentication processes. Machine studying algorithms, a few of which prepare themselves to generate pictures or textual content primarily based on prompts, will be capable of run off-chain, however when ZK proofs carry their outcomes on-chain, customers and sensible contracts will be capable of verify the place and the way a chunk of on-line content material was generated.