The Authentication Hierarchy: Engineering Impenetrable Identity through Cryptographic Possession | Bottorring