we can just copy a regulatory regime seen in other industries: non-compliant offerings are outright illegal and anyone trading in it can be sanctioned outright, while compliant offerings have this feature set.
the feature set can have a standardized way of tracking provenance, which the user can look at and revoke its compliance if desired, by signing a cryptographic signature that produces the expected address that approved consent to begin with. the same address's public key would be used for royalty payment. there are many examples of this working in standardized ways in some networks.
we can just copy a regulatory regime seen in other industries: non-compliant offerings are outright illegal and anyone trading in it can be sanctioned outright, while compliant offerings have this feature set.
the feature set can have a standardized way of tracking provenance, which the user can look at and revoke its compliance if desired, by signing a cryptographic signature that produces the expected address that approved consent to begin with. the same address's public key would be used for royalty payment. there are many examples of this working in standardized ways in some networks.