![]() ![]() This document also touches on our plan for organizations, which isn't yet in development. This announcement explains the high-level, this documentation page goes into further detail, and the KBFS Crypto Spec. We are using keybase filesystem (KBFS) for securely sharing encrypted files (containing keys, passwords, etc). This document describes the cryptographic decisions in the design. Keybase is a cryptographically secure, popular tool to verify identities, and provide secure groups, files and chats. Keybase is free and simple to use, although the secret files need to be re. The Keybase File system (KBFS) is now in active development and will be our first product launch. The plugin delegates to the keybase pgp encrypt and keybase pgp decrypt commands. These include native software clients for all the major platforms (iOS, Android, OS X, Linux, and Windows) that make it easy to do secure messaging and file sharing using the Keybase directory. This document describes the local-key security system. In general, we are trying to make light use of passphrases, but for certain operations like locking local secret keys, passphrases can be unavoidable. ![]() keybase encrypt -m 'the club meets 9pm' friend1 friend2 friend3 keybase encrypt -i steamy.mov -o literature-notes. Keybase is not a trusted man-in-the-middle here, and no one else has keys. Local Key Storage (LKS)Ī usability requirement of Keybase is that the user only should have to remember one passphrase, and if that passphrase changes on one device, all other devices to immediately reflect that change. She decrypts the key, gaining access to the file. (Kickstarter), an online PGP keygen using kbpgp. Top Secret, a game inspired by the Snowden leaks. OnlyKey WebCrypt, a serverless web app that integrates with OnlyKey and Keybase to provide PGP encryption everywhere on-the-go. This document describes the protocol, but will eventually be public once the protocol is reviewed. The Keybase team & KBPGP contributors have not audited and are not responsible for the projects below. When users provision new devices, they exchange keys so that the existing device signs the new device into operation, and the new device gets access to some secret data that otherwise would only be available if the user entered her passphrase (which we try to avoid on mobile devices). We posted a follow-on public document describing how we use the bitcoin blockchain to enhance security guarantees.Īs we launched per-device secret keys, we posted another document describing the specifics of user signature chains, and how users go about delegating authority to new keys and revoking old keys. This document describes our high-level approach to system security: namely, that Keybase clients take hints and raw data from our server, but mistrust it, and check all of its work. Here is a collection of documents describing the crypto at play throughout the If a Keybase user only has a PGP key, or you'd rather encrypt for that: keybase pgp encrypt chris -m 'secret' encrypt keybase pgp encrypt maxtacotwitter -m 'secret' using a twitter name keybase pgp encrypt maxtacoreddit -m 'secret' using a Reddit name keybase pgp encrypt chris -s -m 'secret' also sign with -s keybase pgp encrypt chris. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |