Keybase is meant to eliminate most of the geek work required to use public key encryption. In this Keybase review you will get a sense of how well they have succeeded. While Keybase can do everything from encrypted chats to providing a massive amount of free cloud storage, to storing your cryptocurrencies, we are going to concern ourselves primarily with Keybase’s role as a secure messaging service. Let’s start by looking at the pros and cons of Keybase messenger capabilities. UPDATE: Shortly after publishing this review, Keybase announced it was acquire by Zoom. This is bad news, and we have updated this review (below) to explain why. Here are some key features to consider when deciding whether the Keybase is right for you: Now that we’ve touched on the pros and cons we found in this Keybase review, let’s cover some of the major features.Ĭhat not as easy to use or full featured as competition.Now owned by Zoom with ties to China (privacy concerns).With the new ownership change, and the privacy-abusing practices of Zoom, Keybase is no longer recommended. Secure, end-to-end encryption protects the contents of your messages and files.Keybase security was independently reviewed in 2018/2019.Clients for Android, iOS, Mac OS, Windows, Linux, and browser extensions.Keybase is a complicated suite of encrypted services that includes individual instant messaging and team chat.I haven’t been able to find much information on Keybase, Inc. the company behind the Keybase app and service. The company was co-founded in 2014 by Max Krohn and Chris Coyne, the founders of the OKCupid dating service. In 2015, the company raised $10.8 million in a Series A round led by a16z. One major update to this Keybase review is the change in ownership. Many longtime Keybase users vented their frustration on Twitter with the announcement.įirst, Zoom has been in the news a lot lately for privacy and security concerns: On May 7th, 2020, news broke that Zoom had acquired Keybase.Zoom iOS App Sends Data to Facebook Even if You Don’t Have a Facebook Account.New York Attorney General Looks Into Zoom’s Privacy Practices.‘Zoom is malware’: why experts worry about the video conferencing platform.Zoom is Leaking Peoples’ Email Addresses and Photos to Strangers.There are many articles covering the privacy and security concerns of Zoom, but you get the point. The second problem is that Zoom has ties to China, which is a very bad jurisdiction for privacy. This article details Zoom’s “surprising links to China” that were discovered by a team of researchers in Canada. The report points out that Zoom may be legally obligated to share encryption keys with Chinese authorities if the keys are generated on a key management server hosted in China. If the Chinese authorities or any other hypothetical attacker with access to a key wants to spy on a Zoom meeting, they also need to either monitor the internet access of a participant in the meeting, or monitor the network inside the Zoom cloud. Once they collect the encrypted meeting traffic, they can use the key to decrypt it and recover the video and audio."We believe this will provide equivalent or better security than existing consumer end-to-end encrypted messaging platforms, but with the video quality and scale that has made Zoom the choice of over 300 million daily meeting participants, including those at some of the world's largest enterprises," Yuan wrote. The end-to-end encryption will not be an option for users of the free Zoom service, so unfortunately, you won't be able to fully encrypt your cousin's Zoom birthday party.Ĭurrently, Zoom meeting content is encrypted from the client end (i.e., you) to the server end (i.e., Zoom). Zoom servers can see the content if they have to, and they do have to if anyone joins in from a phone. Zoom had referred to this setup as end-to-end encryption, but everyone else in the technology world disagreed.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |