The example say:
// Finally we sign this object with cryptographic material from
// Alyssa's Car's capabilityDelegation field, and using the
// capabilityDelegation proofPurpose.
It is unclear, who is meant by "we", i.e who generates the signature and possesses the private key