Clients have faith in you with their details. Have you at any time given your wallet to an individual, asking them to go buy something? How about a stranger? Once the network verifies the identification, the user logs in. Authorization then establishes the level of entry according to network https://ieeexplore.ieee.org/document/9941250