Design for security
Design for security
Posted Jan 31, 2019 15:43 UTC (Thu) by naptastic (guest, #60139)In reply to: Design for security by cpitrat
Parent article: Design for security
Now we use Keybase and and it just works. We use our real names, actual photographs of ourselves, proofs anywhere we possibly can, and we only "follow" each other after verifying account ownership in person. (We treat "following" the same way as signing someone's public key, and make sure they understand that before following them.) The UI isn't great, and the .deb is >100 MB, but you know what? Good security is inconvenient, and having to download a 100MB .deb every other day is still a million times better UX than GPG.
