<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Tue, Sep 9, 2014 at 9:35 AM, Daniel Kahn Gillmor <span dir="ltr"><<a href="mailto:dkg@fifthhorseman.net" target="_blank">dkg@fifthhorseman.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"> 1) i regularly communicate with "foo" on twitter, and i want to know<br>
how to communicate with the author in other communications channels.<br><br>
I think the proposed publications only (marginally) addresses use case<br>
(1)</blockquote><div><br></div><div>If you have your key fingerprint published through many channels, someone concerned with actually verifying your key fingerprint can check them all to ensure they match. If there's a discrepancy, something is probably amiss.</div><div><br></div><div>Perhaps an attacker managed to compromise them all and update your key fingerprints in all locations to confuse a victim into sending the attacker an encrypted message. Sure, it's not a great solution. It's an OK solution, however. Certainly better (from a security, not usability perspective) than TOFU.</div><div><br></div><div>Short of things like Google's proposed CT-alike for E2E looking for dishonest Key Directories, I'm not sure how you do better.</div><div><br></div></div>-- <br>Tony Arcieri<br>
</div></div>