On Mon, Sep 8, 2014 at 5:17 PM, Tom Ritter <[email protected]> wrote:

> If you're going to enumerate nuances of key authenticity, I think
> there's more. Some nuances that, to me, upgrade the authenticity of a
> key.
>  - If I receive the key over an anonymous channel vs a bound channel.
> (e.g. Tor vs Internet)
>

​[since I’m the the guy who keeps bringing up the keybase approach]​
​​
- If there's a publicly-accessible tweet or github gist verifiably signed
by the private key associated with the public key, and you’re pretty ​sure
you know who controls those Twitter/github accounts.
​

[Trevor helped me with a message bounce and said this group hadn’t really
kicked keybase around yet, so I’ll separately do a quick overview].​
_______________________________________________
Messaging mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to