![]() If you have a Keybase account and have installed the latest version of Keybase, you'll be asked to make a device key and paper key during first login.Īlso, PGP continues to be supported, and, heck, you can now have multiple PGP keys on one account. In the meantime, we're getting all our ducks in a row. That's vague, but we'll have a more specific announcement (especially on 1 and 2) in the next 3-4 months. easier security/identity for other apps that use keys, such as SSH, bitcoin, and other communication apps.safer end-to-end file encryption & sharing (both for your own data, and for your collaborations).safer publishing of signed, unencrypted data (such as source code and binaries) SimpleX Chat is described as SimpleX - the most private and secure chat and applications platform - now with double ratchet E2E encryption Built on Haskell with Love and Coffee and is a instant messenger in the social & communications category. ![]() In the long run, we hope to bring a number of solutions, fully cross-platform: Paper keys, like devices, must be publicly announced and are publicly removed. ![]() The important thing is that she is herself, the sum of all her proofs, on any device She even used her paper key to provision a device! Here we see a user with 4 computers (2 are mobile) and 6 keys The company, called Keybase, is open source and audited by (paid) third parties, but users and two-factor authentication advocates often ding the company for not offering 2FA. In the above example, the first 2 words ("death punch") are a public label, You can put that in your wallet or stick it in a drawer. Slightly cumbersome, these are full NaCl keys that can be used to provision a new computer.Īn example: death punch correct staple battery horse clearly cherry picked words yeah moo car lisp In the short term, beta testers can now generate paper keys. Until they're ready, bringing 2 computers together is tough. Our mobile apps are in active development. (Our merkle tree + bitcoin are discussed here. So are statements of the form "I lost my device." In other words, the Keybase server cannot provide different answers to different users. Provisioning a device key (and choosing a public name for it) is a public action. You won't even need a passphrase, and it will take seconds. In this way, you can be you, without moving a private key around. ![]() They will use that secret to authenticate, sign, & announce each other's keys, including whatever you name each device. Technically, though, this is not a normal 2fa: the devices will share a secret with just each other. People are getting used to 2-factor experiences emerging, and we imagine the phone will be the most-used device in provisioning. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |