T23:57:32.207008+03:00 ▶ 04b no files found matching "/home/avamander/.cache/keybase/*" falling back to default glob Everyone can use it.T23:57:25.274581+03:00 ▶ 015 attempting retrieval of keybase service status But Keybase makes the usage so damn simple. The whole thing is based own the well known GPG and works the same way. To make this save, your own key comes to action (see link above for more details). If you track a person, their identity will be trusted generally and doesn't have to be verified every single time. How this works in detail, is documented here. At first using the key, then using her/his verified accounts. You keybase client always assumes it can trust nobody, not even its own keybase server! So, it will always try to verify the receiver of your messages. Tracking is nothing more than a vote of confidence. Tracking isĭu kannst bestimmte Benutzer auch tracken. You could use my username on twitter for encryption: keybase encrypt twitter://mauricehh -m 'Streng geheime Nachricht' Tracking The great thing ist, even if you don't know my keybase name, you can use the username of one of my verified account. I can decrypt the message and make it readable: keybase decrypt geheime_nachricht.asc So let's assume you want to send me an encrypted message: keybase encrypt mauricerenck -m 'Alles klar bei dir?'Īs a result, you'll get an encrypted messages you can send to me by mail or however else. The most classic application is the encryption of a text, in an e-mail for example. The complete list of supported services can be found here. You will then have to tweet a certain text, which will be used as verification. To enable others to check your identitity, you should start verifing your accounts, for example your twitter account: keybase prove twitter You will then get a list of all identities verified by this user. You can do this by typing: keybase id twitter://mauricehh Using an easy command, you can verify the identity of a twitter user (in case she/he is registered, too). You will be prompted to enter username and password. If you didn't do already, log in to you account: keybase login You can do all this on the website, too, but this way it's easier to explain. Several services are supported.Īt this point I assume you installed the commandline tools (cli). This may be your website, your twitter or github account. Verify your identityĪfter installation and setup, you can start verifing your identities (accounts). I won't tell you how to do so, because it's very well documented on the Keybase website. If you don't want to use the website, you can install the commandline tool. After registration you can create a keypair or upload an existing key. RegistrationĪt the moment the registration is invite only (I'll tell you how you can get an invite below). You can use it directly on their website, or use a commandline tool or event their API. Keybase isn't that new service anymore, but it wants to make encryption and validation of accounts easier. And what about other communication channels? Hello Keybase! They scan your mails to show related ads. Even if the secret service isn't co-reading, the algorythms of your e-mail-provider will do. Actually there is no more excuse not to encrypt your communication.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |