Verifying identity without an ID is a complex process that typically involves multiple forms of authentication, such as knowledge-based authentication (e.g., answering security questions), possession-based authentication (e.g., using a mobile app or hardware token), and biometric authentication (e.g., fingerprint or facial recognition). These methods are designed to ensure that the claimed identity matches the actual user.