You are reading content from Scuttlebutt
@dan %l4QYmXIEuaQJlbUPYP2mtlv7pbJ20ZOC8tIz+aIbfPg=.sha256
Re: %7FSY+a3Pt

An alternative approach is something like what keybase does -

person A binds their keybase id to other ids on the web
keybase authenticates these assertions
person B follows person A and keeps a logs of the assertions made
each time person A's assertions change person B is asked to accept the assertions

Join Scuttlebutt now