<div dir="auto"><div data-smartmail="gmail_signature" dir="auto"><br></div><div class="gmail_extra" dir="auto"><div class="gmail_quote">Den 10 feb. 2017 00:48 skrev "Trevor Perrin" <<a href="mailto:trevp@trevp.net">trevp@trevp.net</a>>:<br type="attribution"><blockquote class="quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
Issue (4) seems somewhat a result of Keybase's decision on issue (3).<br>
I.e. if you just published a public-key fingerprint instead of<br>
signatures, then size would be less of an issue and you'd have compact<br>
statements that were easier to fit into Tweets, profile text, etc.<br>
<br>
That would not prevent Alice from publishing someone else's<br>
fingerprints, which is perhaps an "unknown key share" or "identity<br>
misbinding" situation. I wonder how much of a problem that really is<br>
here, though, and whether it's worth the complexities that this adds? <br></blockquote></div></div><div dir="auto"><br></div><div dir="auto">Keybase enables username lookups across these 3rd party sites. I can share a file to your twitter username on KBFS and they'll tell me your specified key to encrypt to. </div><div dir="auto"><br></div><div dir="auto">Under one's keybase profile they also list all accounts with published proofs. </div><div dir="auto"><br></div><div dir="auto">Without reliable binding using signatures this means that somebody can spoof another keybase user from their 3rd party site accounts, get people to remember the wrong username, and then change the keys on the fake accounts and have people send messages to the wrong person. </div><div dir="auto">All because people saw a twitter post appearing to belong to the reddit user they might trust, as an example. </div><div class="gmail_extra" dir="auto"><div class="gmail_quote"><blockquote class="quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"></blockquote></div></div></div>