They could still perform a man in the middle attack, re-signing all of your notes with a new public key.
Discussion
But then they would be signed by a different key
They could still perform a man in the middle attack, re-signing all of your notes with a new public key.
But then they would be signed by a different key