They could still perform a man in the middle attack, re-signing all of your notes with a new public key.

Reply to this note

Please Login to reply.

Discussion

But then they would be signed by a different key

Correct, but what if someone sees the posts from the second key-pair first? How would anyone be able to tell which public key is the real one?

Web of trust, out of band key exchange, lots of ways. The objection you're making doesn't really make sense.