For years, the standard approach to traditional KYC has relied on a straightforward, brute-force mechanism: collect every possible physical or digital document, verify it against a database or human ...