Fwiw, I own an original physical copy of the book and have watched all of Jason's podcast appearances. This was the same time I worked at a defense contractor who provided cyber red team augmentation to DoD. The thesis was discussed at length without finding a concrete way to demonstrate bitcoin beng used to safeguard cyberspace outside of itself.
Paying for a key doesn't mean the payment is the key. The key is the key.
Perhaps homomorphic encryption could work but im unaware of functioning specs/code for that.