Proof of Access: A Technical Overview