![]() ![]() The information you provide when signing up, i.e.Probably obvious data collection, usage, and sharing: I’m sure a lot of us are guilty of "leafing" through privacy policies and usage agreements however, considering that Keybase’s purpose is to store sensitive information you might want to be aware of the what/where/how they collect and store data. Make sure you read Keybase’s privacy policy. It’s worth noting that while Keybase does work with GPG and does have a relatively slick CLI, the Keybase CLI does lack equivalents to gpg -list-keys and gpg -export.Ĭurrently Keybase is in alpha – so that means you need an invite or you can join the wait queue. It’s a new feature and definitely worth reading more about here. Keybase has also created their own file system, which encrypts everything in their mounted drive. The idea is that when you meet someone online and want to exchange secure messages or files with them, you will want some way to establish the other party is who they say they are. Keybase is an identity management service allowing users to manage keys, social media accounts, and devices. ![]() Specifically, GPG Tools includes a utility that integrates with Apple Mail, a GPG Keychain to manage OpenPGP keys, and a command line tool (which I will be using below). GPG, or GNU Privacy Guard, is a replacement for Symantec’s PGP cryptographic software suite and allows users to encrypt sensitive information. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |