@ryanc @bo0tzz Do you mean stuff like zkSENSE or Cloudflare CAP?
The former explicitly leaves data authenticity outside the threat model, making it pretty much entirely useless, as you pointed out (it's not even a secret... the paper says as much).
The latter seems to rely on hardware authentication.
Though I didn't look into the details much, because tbh I'm not particularly interested in these approaches, as they are either entirely useless or tied to specific trusted OEMs.