I will henceforth refer to the TLS threat model as "its not the cloud^H^H^H^H^H Certificate Authority, its someone else's DNS resolver!"
Discussion
i use a hash of pubkey mapped to bip words as a verbal verification of my contact's keys, and a multisig custody for my keys (pedersom dkg)