
Keybase actually spells out its implementation of the Web of Trust for each.

In fact, if you click on the preceding links, they are postings to all of those places (or DNS entries) that help to authenticate my public key hosted with Keybase.

The basic idea of Keybase is that if you trust that I, Jeff Reifman, control my Twitter account, GitHub account and my personal and consulting websites, then you can trust the public key that has been authenticated by postings to those accounts and websites. It's a free service built by two of the co-founders of OKCupid, Chris Coyne and Max Krohn. Keybase is an attempt to build a web of trust on our social accounts and the websites we host. How sure are you that the person who sent you a message actually holds the private key that signed it? Or how certain are you that the message you encrypted with someone's public key is actually not an impostor's? Depending on how important the confidentiality and validity of your messages are, these questions can literally mean life or death. What Is Keybase?įrom the beginning, PGP's effectiveness is limited by the Web of Trust. If you have a question or topic suggestion, please post a comment below. You can also follow me on Twitter email me directly. Just a reminder, I regularly participate in the discussions below.
#Keybase cryptocurrency series
Finally, as part of the series on managing your digital assets after your death, we'll use what we've learned to create a secure cache of important information for your descendants in case of emergency. In upcoming episodes, we'll explore encrypting browser-based email, and then we'll switch topics a bit to encrypting your Internet activities with the use of a VPN. In addition to reading the earlier episodes, you may want to check out the Electronic Frontier Foundation's The Surveillance Self-Defense Guide and their explainer on Key Verification. In this tutorial, I'll guide you through using a new service which strengthens the Web of Trust, creating a sophisticated audit trail of authentication for the validity of public keys.
#Keybase cryptocurrency for mac os
In the second tutorial, I guided you through installing encryption software on your computer and getting started sending your first messages we used GPGTools for Mac OS X, an integration of open-source GnuPG. In the first tutorial, we introduced the general concepts of encryption and how they can be used to secure and authenticate our emails. This is the next tutorial in a series focusing on encrypting your email.
