An alternative approach is something like what keybase does -
person A binds their keybase id to other ids on the web
keybase authenticates these assertions
person B follows person A and keeps a logs of the assertions made
each time person A's assertions change person B is asked to accept the assertions