What prevents us from having to trust Verisign (or its employees) or a government warrant, etc. to not do the same?
Can we leverage signed DNS records to add another layer of control needed?
Do we also need encrypted DNS where we can choose who to trust?
Are we stuck with the CA trust model?
> What prevents us from having to trust Verisign (or its employees) or a government warrant, etc. to not do the same?
Certificate Transparency. Current browsers are moving to not trust any certificate whose issuance wasn't publicly logged. That doesn't prevent an attacker from issuing an MITM certificate, but doing so would permanently burn a CA. (At least, once the policies are in place and enforced.)
You're right, trust is a major issue with any PKI. You can find hundreds of research papers and blog posts and probably even a few whole books on the topic, I'm sure :)
Can we leverage signed DNS records to add another layer of control needed? Do we also need encrypted DNS where we can choose who to trust? Are we stuck with the CA trust model?