How Does the Verifier Prevent Replay Attacks on the Cryptographic Proof?
Replay attacks are prevented by including a unique, fresh element, such as a nonce or a block hash, in the data that is being proved and signed. This ensures that the cryptographic proof is only valid for the specific, current context.
If an attacker tries to "replay" an old proof, the verifier will detect that the unique element does not match the current state, invalidating the proof.