On Mon, Sep 8, 2014 at 5:17 PM, Tom Ritter <[email protected]> wrote: > If you're going to enumerate nuances of key authenticity, I think > there's more. Some nuances that, to me, upgrade the authenticity of a > key. > - If I receive the key over an anonymous channel vs a bound channel. > (e.g. Tor vs Internet) >
[since I’m the the guy who keeps bringing up the keybase approach] - If there's a publicly-accessible tweet or github gist verifiably signed by the private key associated with the public key, and you’re pretty sure you know who controls those Twitter/github accounts. [Trevor helped me with a message bounce and said this group hadn’t really kicked keybase around yet, so I’ll separately do a quick overview].
_______________________________________________ Messaging mailing list [email protected] https://moderncrypto.org/mailman/listinfo/messaging
