@munin Are you talking about when it's true or when someone's taking advantage of the ambiguity of if it's true?
Something akin to the ideas behind zero knowledge proofs can be employed (even if not formally that) by either encrypting or revealing a specifically suggested section of content as a proof of infiltration. Not that I advocate it (I definitely don't) and not that people are tech-literate enough to understand what that means necessarily..