Comments on: Keybase: Mostly Painless Public Encryption http://www.terminally-incoherent.com/blog/2014/06/01/keybase-mostly-painless-public-encryption/ I will not fix your computer. Tue, 04 Aug 2020 22:34:33 +0000 hourly 1 https://wordpress.org/?v=4.7.26 By: Lou http://www.terminally-incoherent.com/blog/2014/06/01/keybase-mostly-painless-public-encryption/#comment-179772 Mon, 10 Nov 2014 00:40:58 +0000 http://www.terminally-incoherent.com/blog/?p=17151#comment-179772

I wouldn’t mind checking out this service – if you have any invites left I would appreciate one as well.

Thank you,
Lou

Reply  |  Quote
]]>
By: Hexren http://www.terminally-incoherent.com/blog/2014/06/01/keybase-mostly-painless-public-encryption/#comment-108785 Sun, 08 Jun 2014 15:19:35 +0000 http://www.terminally-incoherent.com/blog/?p=17151#comment-108785

Hey,

If there are still invitations I’d like one :)

Hexren

Reply  |  Quote
]]>
By: Wesley http://www.terminally-incoherent.com/blog/2014/06/01/keybase-mostly-painless-public-encryption/#comment-107599 Wed, 04 Jun 2014 01:59:32 +0000 http://www.terminally-incoherent.com/blog/?p=17151#comment-107599

Looking more at their website, giving out a different public key wouldn’t work. When you verify, you publish a signed message, thus if keybase.io sent a diffrent one, the client would detect that and reject the key.

So, you only need to trust the client, and it’s open source :)

Reply  |  Quote
]]>
By: Rahmat Budiharso http://www.terminally-incoherent.com/blog/2014/06/01/keybase-mostly-painless-public-encryption/#comment-107385 Tue, 03 Jun 2014 08:43:22 +0000 http://www.terminally-incoherent.com/blog/?p=17151#comment-107385
-----BEGIN PGP MESSAGE-----
Version: Keybase OpenPGP v0.1.17
Comment: https://keybase.io/crypto
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=azwh
-----END PGP MESSAGE-----
Reply  |  Quote
]]>
By: Luke Maciak http://www.terminally-incoherent.com/blog/2014/06/01/keybase-mostly-painless-public-encryption/#comment-107336 Tue, 03 Jun 2014 04:59:35 +0000 http://www.terminally-incoherent.com/blog/?p=17151#comment-107336

@ Wesley:

To sign, yes. To encrypt no. You can encrypt a message without signing it. So if Bob is smart, he will sign all this messages so that Alice can tell if there is any tampering going on. The NSA (or enemy spies or whoever) could still read Bob’s initial message, and if if he was whistle-blowing or spying or whatever, he could still get v& though.

Reply  |  Quote
]]>
By: Wesley http://www.terminally-incoherent.com/blog/2014/06/01/keybase-mostly-painless-public-encryption/#comment-107270 Mon, 02 Jun 2014 22:44:46 +0000 http://www.terminally-incoherent.com/blog/?p=17151#comment-107270

@Luke

> They grab alice.asc from Keybase, re-encrypt it this time for reals, and send it to Alice.

This is that part I’m confused on. Won’t they need Bob’s private key to sign/encrypt it?

Reply  |  Quote
]]>
By: Luke Maciak http://www.terminally-incoherent.com/blog/2014/06/01/keybase-mostly-painless-public-encryption/#comment-107268 Mon, 02 Jun 2014 22:39:56 +0000 http://www.terminally-incoherent.com/blog/?p=17151#comment-107268

@ Wesley:

I think that the scenario mentioned by @ Dr. Azrael Tod goes as follows:

– Alice signs up for Keybase and uploads her public key alice.asc
– NSA (or whoever) coerves Keybase to secretly generates a fake key fake.asc based on their private key
– When when someone goes to check Alice’s profile they see alice.asc
– When Bob logs in, and check Alice’s profile Kebyase is told to serve him fake.asc instead
– Bob encrypts a secret message to Alice using fake.asc and emails it to Alice
– NSA intercepts the email before it reaches Alice and decrypts it.
– They read the message and immediately dispatch Party Van to fetch Bob
– They grab alice.asc from Keybase, re-encrypt the message, and send it to Alice as if nothing happened
– Alice is none-the-wiser and Bob is in secret off-shore prison

The scenario of course requires the third party to be able to compromise both Keybase and the medium Bob and Alice choose to exchange information (so presumably Gmail) which is not that far fetched given Prism and all.

Reply  |  Quote
]]>
By: Wesley http://www.terminally-incoherent.com/blog/2014/06/01/keybase-mostly-painless-public-encryption/#comment-107258 Mon, 02 Jun 2014 21:26:22 +0000 http://www.terminally-incoherent.com/blog/?p=17151#comment-107258

@Dr. Azrael Tod:

If I got a message from Bob that was plaintext after sending him an encrypted message, I would be suspicous as hell. That doesn’t stop keybase from reading my message, but it stops a total man in the middle attack.

Installation isn’t a problem from me, being on Arch Linux it’s in the AUR. That means that there’s a nice little bash script that will make a package of it with all the depends of everything taken care of :)

Reply  |  Quote
]]>
By: Luke Maciak http://www.terminally-incoherent.com/blog/2014/06/01/keybase-mostly-painless-public-encryption/#comment-107254 Mon, 02 Jun 2014 21:00:55 +0000 http://www.terminally-incoherent.com/blog/?p=17151#comment-107254

@ Wesley:

-----BEGIN PGP MESSAGE-----
Version: Keybase OpenPGP v0.1.17
Comment: https://keybase.io/crypto

wcBMA/tKCy4ldUCnAQf6As1202aIEHEikUmnzVFuahNyiFtpzS+8VNCqf6UHdQfZ
Van0yODfYek+l2phO90H5c3ANUqNNfyKZ489/vHu5kxD/EvdgPv0UjG5x1eBYB1e
r3u6+vADBDAh+HAuZAkQZ4JADGDTXjC4x3iPa5WEuTPLwnlhK5+N4/OdRNENQH2q
hsJlU58OAIN9c938sXtPuJx+FQ9soJi0F1rStGaPVeamwnfeC7FfJcutClF4Tf3G
e2dvTCG3rfTaT1MRBHqelfZ1KPhwe/eedCi+xCfiMCMEmWlxd3eDezVYxpRzcYOn
SGz1AlOmHMhJ+mXB8/0vXBkm+aPxZtlfWacoPYJ8r9LB7QEFIsDGOTi8WDPO/i3p
hEKUwwW81BlDGi+Cr5uXty7+PX+xmUiCuzG8UQtoNsXIN5G09nTSbM5JZzQ94CCy
9wDApqTKBfemjdpNgnZ55Tp+o4Qsuy1QU2Hz+1kzvHyrJDOZefVpzEsVuht2xxe6
f2v+r1Bg9lDCJxaPHAETYRmh7GBJkvCPr7OcSnN+cTA7CCbciSUcGuJMv76K0TJo
Piwc2QT8+qTnvmAmRB821gsY5N0LlJ0vkcqpnjL9p0wDqqXCVrHVbqsXG46gqAK1
hW1MgMGI3LqOmwLDGWOFw9ZR5KNGqWv94YIJOIzEyKdCbm0daI7+wD6T6JOOF7ME
9JcEMJ1WAF9fltZAMVCqpvTwTRcpfsOEy4qkclYr2EvizaLCXx5kVWzWbFhKpnAP
bl/vA52DTz+CFxUpNMotJXpFYIdioKrSkVRbzVvKc4/Y8rL180swymY0kBJwOfIm
pdWnAq7CO3vOoD8LNW27rKV8ta4YixjUikmAtekDpfK4SoGz7uX5tMbxLEKUv8XF
TMWrDlcJV6J0EkxIvgSaglbGZTQ2o564umQnR0AaMY0FQXK68gasBGV13ioinW+P
vrhL+lhyAYnuhWzaMQXoWplICQB8wZqNYJrKi+buRX3VPltYw/Ht+0EUPXofa1Ae
4FQ2BOyRcIdMKYAds7+VNnGtAdb+vTLrfCuEiWPlyNkWbzjWkfCZepwJws3QUYq6
tf6odKc3ZWHqITav/5LAC64AT6V8Vn86nDZVrdoY2NkEJ/On4RHGuiN5StRy9oFj
2T2U09L0YhiF4pgzOKO2TgXBn8/dRib9gzR+dmVAHx8RM9dsQ1L5DzT5gsIVDHOl
iCThjx//B10XzvnKlMqAmOZ3m//3I8U4jiiJ9gSLfoJpVeYL0sYo3/+AvS9gQ9A=
=xuCZ
-----END PGP MESSAGE-----

:D

@ Dr. Azrael Tod:

Yeah, the thing could potentially be abused quite a bit. It’s interesting how increasing UX tends to decrease the actual security of a system by generating use cases where system would be easy to abuse, or by introducing a third party with implied trust. :(

But, it’s the most interesting thing I have seen being done with public encryption as of late. So as long as we are cautious and keep in mind the risks, I have no problem supporting what they are doing. :)

Oh, and NodeJS is already installed most machines I own because I use Grunt, Bower and Yeoman a lot. So I actually did not think of that as a downside. Ruby, Python and Node are usually the three things I install immediately upon booting up a new machine. :)

Reply  |  Quote
]]>
By: Dr. Azrael Tod http://www.terminally-incoherent.com/blog/2014/06/01/keybase-mostly-painless-public-encryption/#comment-107248 Mon, 02 Jun 2014 20:37:16 +0000 http://www.terminally-incoherent.com/blog/?p=17151#comment-107248

@ Wesley:
well i was speaking of encrypting it _for_ alice to decrypt with alice’s private key. For that you only need the public key. Of course, you couldn’t sign as bob.

the matter of giving users a way to upload private keys is just another thing…
ok, it “should” be encrypted and somewhat secure (if the key isn’t “1234”). But really?

The last big problem i have with keybase is that the software by them needs node.js and should be installed via npm. Things you plainly will never see on computers i controll.
that wouldn’t be a problem if they had small bash-scripts for everything (they have for some things like registration and signing auth-messages for twitter/github/whatever).
but they lack this for “tracking” (thats signing keys afaik?)

…and keybase.io is no real keyserver that i could use with existing software. But that’s just a missing feature.

Reply  |  Quote
]]>