Verifiable proof
Sharing data in a form that is hard to forge. It can be checked using mathematical formulas, for example to verify that messages are endtoend encrypted.
Advantages

Doesn’t rely on external infrastructure that could be malicious
Limitations

Some people won’t understand what is being checked

The underlying maths can later be found to be insecure