• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / Keybase embraces social networks for cryptography

Keybase embraces social networks for cryptography

2014-10-13 by Jason

Public key encryption is based on two keys, a public key and a private key. To send someone an encrypted message, you must find the recipient’s public key which would allow them to decrypt the message with their private key, something only they know. Keybase aims to help PKI by taking advantage of social networks, places where people are already pushing their identities. By tying social networks and identity together with Keybase, you can easily find a person’s public key and verify that they are the intended recipient by seeing their presences on Twitter, Reddit, Coinbase, Github, their own websites, and more.

keybase

Keybase is not reinventing cryptography and public key warehouses have existed before but Keybase seems to be taking a fresh look at PKI and embracing social networks to provide identity verification. You can confirm your Twitter account with a simple tweet, websites with a DNS record, and others. You then have a profile on Keybase where others can find your identity and public key.

keybase_profile

 

With the Keybase website, you can encrypt, decrypt, sign, or verify messages. Some of those functions require signing in, of course. You can also “follow” individuals that you communicate with frequently to verify their identity so Keybase can track them for you.

keybase_message

You can take the GPG-encrypted message and send it to the recipient in any form of communication you prefer, knowing that its contents will be secure and only someone with the recipient’s private key will be able to decrypt the message. By signing it, the recipient will also be able to verify that you truly sent it by decrypting the message with your public key.

In addition to the website, Keybase is also a command line operation. You can do all of the functionality through the command line or the website.

Keybase is free and currently in beta with invites pending. You can learn more or request an invite at https://keybase.io/

pki_keys

Filed Under: Security and Privacy, Web

Trending

  • Social media is making us narcissistic
    In Infographics
  • Dual Monitor vs Ultra-Wide Monitor: Which is Better?
    In Hardware, Gadgets, and Products
  • What Your Browser Says About You and Security Tips
    In Media, Security and Privacy

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • What is the AllJoyn Router Service on Windows 10? What is the AllJoyn Router Service on Windows 10?
  • Access to the resource [servershare] has been disallowed Access to the resource [servershare] has been disallowed
  • How a DirecTV bill really works in 2015 How a DirecTV bill really works in 2015
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • SOLVED: “This modification is not allowed because the selection is locked.” SOLVED: "This modification is not allowed because the selection is locked."
  • How Virtual Reality Supports Mental Health Therapy How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in