Well, the nice thing about Keybase is that you don't have to verify it, it's built into the system already and you don't need to think about it. The whole complexity of the social graph is hidden from the user and this is precisely what @TheFuzzStone described - and it's a very interesting usage scenario with real threat actors, which is precisely why it intrigued me so much. In 90% of the regular business security this is superficial because they're centralized...