Type a search term to find related articles by LIMS subject matter experts gathered from the most trusted and dynamic collaboration tools in the laboratory informatics industry.
Type of site | Encrypted encrypted social networking service |
---|---|
Available in | English |
Owner | Zoom Video Communications (2020) |
Created by | Chris Coyne, Max Krohn, others |
URL | keybase |
Registration | Not Required for membership |
Users | 407,163 (as of 2019-08-22) |
Launched | February 14, 2014 |
Written in | Go, JavaScript, Electron, React[1] |
Keybase is a key directory that maps social media identities to encryption keys (including, but not limited to PGP keys) in a publicly auditable manner.[2] Additionally it offers an end-to-end encrypted chat and cloud storage system,[3][4] called Keybase Chat and the Keybase Filesystem respectively. Files placed in the public portion of the filesystem are served from a public endpoint,[5] as well as locally from a filesystem Un-mounted by the Keybase client.[6]
Keybase supports publicly connecting Twitter, GitHub, Reddit, and Hacker News identities, including websites and domains under one's control, to encryption keys. It also supports Bitcoin, Zcash, Stellar, and QRL wallet addresses.[5][5][7][8][9][10] Keybase has supported Coinbase identities since initial public release, but ceased to do so on March 17, 2017, when Coinbase terminated public payment pages.[11] In general, Keybase doesn't allow for any service with public identities to integrate with Keybase.[5][12]
On May 7, 2020, Keybase announced it had been acquired by Zoom,[13] as part of Zoom's "plan to further strengthen the security of [its] video communications platform".[14]
Keybase allows users to prove a link between certain online identities (such as a Twitter or Reddit account) and their encryption keys. Instead of using a system such as OAuth, identities are proven by posting a signed statement as the account a user wishes to prove ownership of. This makes identity proofs publicly verifiable – instead of having to trust that the service is being truthful, a user can find and check the relevant proof statements themselves, and the Keybase client does this automatically.
In addition to the web interface, Keybase offers a client application for Windows,[15][16] Mac,[15][16] Android,[17][16] iOS,[16] and most desktop Linux distributions,[16] written in Go with an Electron front end. The app offers additional features to the website, such as the end-to-end encrypted chat, teams feature, and the ability to add files to and access private files in their personal and team Keybase Filesystem storage. Each device running the client app is authorized by a signature made either by another device or the user's PGP key. Each device is also given a per-device NaCl (pronounced "salt") key to perform cryptographic operations.
Keybase Chat is an end-to-end encrypted chat built in to Keybase launched in February 2017. A distinguishing feature of Keybase Chat is that it allows Keybase users to send messages to someone using their online aliases (for example a reddit account), even if they haven't signed up to Keybase yet.[3]
If the recipient (the online alias owner) has an account on Keybase, they will seamlessly receive the message. If the recipient doesn't have a Keybase account, and later signs up and proves the link between the online account and their devices, the sender's device will rekey the message for the recipient based on the public proof they posted, allowing them to read the message. Since the Keybase app checks the proof, it avoids trust on first use.[18]
Keybase allows users to store up to 250 GB[19] of files in a cloud storage called the Keybase Filesystem for free. There are no storage upgrades available, but paid plans allowing for more data are planned.[20] The filesystem is divided into three parts: public files, private files, and team files. On Unix-like machines, the filesystem is mounted to /keybase
, and on Microsoft Windows systems it is usually mounted to the K drive.[21] Currently, mobile versions of the Keybase client can only download files from kbfs, and can not mount it. However, they do support operations such as rekeying files as necessary. In October 2017 Keybase brought out end-to-end encrypted Git repositories.[22]
Public files are stored in /public/username
, and are publicly visible. All files in the public filesystem are automatically signed by the client.[6] Only the user who the folder is named after can edit its contents, however, a folder may be named after a comma-separated list of users (e.g. a folder /public/foo,bar,three
would be editable by the users foo, bar, and three).[6]
Public files can be accessed by any user. Single user folders are displayed at keybase/public/foo,bar,three
) are only accessible through the mounted version of the system.
Private files are stored in /private/username
, and are only visible to username. Private folders, like public folders, can be named after more than one user (e.g. a folder /private/foo,bar,three
would be readable and editable by the users foo, bar, and three). Private files can also be read only for users after "#" (e.g. a folder /private/writer1,writer2,#reader1,reader2
would be readable and editable by the users writer1 and writer2 but only readable for reader1 and reader2).[6] Unlike public files, all private files are both encrypted and signed before being uploaded, making them end-to-end encrypted.[4]
Team files are stored in /team/teamname
, and are publicly visible to team members. All files in the team filesystem are automatically encrypted and signed by the client.[6] Only users who are marked as writers can edit its contents, however, any readers can access the files stored there.[23]
In September 2017, Keybase launched Keybase Teams.[24] A team is described as "...a named group of people."[25] Each team has a private folder in the Keybase filesystem, and a number of chat channels (similar to Slack). Teams can also be divided into "subteams" by placing a .
in the team name. For example, wikipedia.projects
would be a subteam of wikipedia
, while wikipedia.projects.foobar
would be a subteam of wikipedia.projects
(and therefore, also of wikipedia
).
Teams are largely administered by adding signatures to a chain. Each signature can add, remove, or change the membership of a user in a team, as well as when changes are made to subteams.
Each chain starts with a signature made by the team owner, with subsequent actions signed on by team admins or users.[26] This ensures that every action is made by an authorized user, and that actions can be verified by anyone in possession of the public key used.