• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / Keybase embraces social networks for cryptography

Keybase embraces social networks for cryptography

2014-10-13 by Jason

Public key encryption is based on two keys, a public key and a private key. To send someone an encrypted message, you must find the recipient’s public key which would allow them to decrypt the message with their private key, something only they know. Keybase aims to help PKI by taking advantage of social networks, places where people are already pushing their identities. By tying social networks and identity together with Keybase, you can easily find a person’s public key and verify that they are the intended recipient by seeing their presences on Twitter, Reddit, Coinbase, Github, their own websites, and more.

keybase

Keybase is not reinventing cryptography and public key warehouses have existed before but Keybase seems to be taking a fresh look at PKI and embracing social networks to provide identity verification. You can confirm your Twitter account with a simple tweet, websites with a DNS record, and others. You then have a profile on Keybase where others can find your identity and public key.

keybase_profile

 

With the Keybase website, you can encrypt, decrypt, sign, or verify messages. Some of those functions require signing in, of course. You can also “follow” individuals that you communicate with frequently to verify their identity so Keybase can track them for you.

keybase_message

You can take the GPG-encrypted message and send it to the recipient in any form of communication you prefer, knowing that its contents will be secure and only someone with the recipient’s private key will be able to decrypt the message. By signing it, the recipient will also be able to verify that you truly sent it by decrypting the message with your public key.

In addition to the website, Keybase is also a command line operation. You can do all of the functionality through the command line or the website.

Keybase is free and currently in beta with invites pending. You can learn more or request an invite at https://keybase.io/

pki_keys

Filed Under: Security and Privacy, Web

Trending

  • Gauss Kickstarter – glasses for the digital age
    In Hardware, Gadgets, and Products
  • Antivirus trials on Windows 8 decreases its security
    In Security and Privacy
  • Avast! 6.0 Free Antivirus Is Now Available
    In Security and Privacy, Software

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • Command line to take ownership and change permissions Command line to take ownership and change permissions
  • Creating and editing views in phpMyAdmin Creating and editing views in phpMyAdmin
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • How to Purchase Cryptocurrencies? How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business
  • Benefits of End-To-End Testing That Will Match Company Expectations Benefits of End-To-End Testing That Will Match Company Expectations
  • 3 Key Features of Pets Health Monitoring Systems 3 Key Features of Pets Health Monitoring Systems
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2023 · Magazine Pro Theme on Genesis Framework · WordPress · Log in