Im no expert, but possibly something similar to how you prove to a website that you own your lightning node? Signing a message?

I know its more nuanced than that, but its a start...

Reply to this note

Please Login to reply.

Discussion

There are theoretically many ways. None are absolute (the closest probably being trading info in person) and people would need to verify in accordance with their own threat models.