Keybase
Keybase is an open-source, end-to-end encrypted platform for secure messaging, file sharing, and identity verification, leveraging public key cryptography to map users' social media accounts to cryptographic keys in a publicly auditable way.[1][2] Founded in 2014 by software engineers Chris Coyne and Max Krohn, Keybase aimed to simplify the use of encryption by allowing individuals to prove ownership of online identities—such as Twitter, GitHub, or Reddit accounts—through cryptographic proofs, thereby building trust without relying on centralized authorities.[3] The service provides features like private team chats, self-destructing messages with timers, and the Keybase Filesystem (KBFS), a distributed, encrypted cloud storage system that operates under a global namespace while ensuring only authorized users can access files.[1][2] In May 2020, Keybase was acquired by Zoom Video Communications in its first-ever purchase, valued for its encryption expertise to bolster Zoom's end-to-end encryption capabilities amid growing security demands during the COVID-19 pandemic.[4][5] As of November 2025, Keybase remains operational under Zoom, supporting cross-platform access on desktop, mobile, and via Tor, though development has slowed post-acquisition and it has faced criticism for privacy concerns related to Zoom's ownership, complicated user interface, and a small user base.[1][6]History
Founding and early development
Keybase was founded by Chris Coyne and Max Krohn, both of whom had previously co-founded the online dating platform OKCupid and sold it to Match Group in 2011.[7] Drawing from their experience in building user-friendly web applications, Coyne and Krohn aimed to address longstanding barriers in secure communication tools. The company was incorporated as Keybase, Inc. in New York in 2014, initially operating as a small team with limited resources and no formal business model at launch.[3] The platform launched publicly in early 2014 as a free, open-source service designed to democratize public key cryptography.[8] At its core, Keybase sought to simplify the discovery and verification of PGP keys by allowing users to link them to established social media identities, such as Twitter and GitHub accounts. This approach eliminated the need for manual key exchanges or reliance on unverified directories, making encryption more approachable for non-experts while maintaining cryptographic integrity through auditable proofs posted directly to those platforms.[7] Keybase emerged amid heightened public awareness of digital privacy following Edward Snowden's 2013 revelations, but it specifically targeted the usability hurdles that had long plagued PGP since its inception in the 1990s. Traditional PGP workflows involved cumbersome processes like attending in-person key signing parties to build a "web of trust" or manually validating fingerprints, which deterred widespread adoption.[7] By leveraging social proofs, Keybase reduced these frictions, enabling users to verify identities with a single click while ensuring that any impersonation would require compromising multiple online accounts. Early traction came quickly, with the service gaining viral attention on Twitter shortly after launch.[8] To support further development, Keybase secured its first major funding in July 2015: a $10.8 million Series A round led by Andreessen Horowitz, with participation from other investors including Stellar Development Foundation.[9] This capital enabled the team to expand beyond the initial key directory prototype, though the focus remained on refining core identity verification tools in the platform's formative years.Key feature launches and expansions
Following its initial launch, Keybase expanded its client offerings to enhance accessibility across devices. The desktop application was first introduced for macOS in early 2015, providing a graphical interface alongside the existing command-line tool for Linux and macOS users. Windows support followed in mid-2016 with a native GUI client, while Linux received improved graphical capabilities shortly thereafter, enabling broader adoption among developers and security enthusiasts.[10][9] In February 2017, Keybase launched end-to-end encrypted chat, marking a significant pivot from identity verification to real-time communication. This feature supported one-on-one conversations and small group chats, integrated directly into the existing clients without requiring separate apps, and leveraged users' cryptographic identities for seamless, secure interactions.[11] Building on this momentum, September 2017 saw the introduction of Keybase Teams, designed for organizational collaboration. Teams allowed groups to create shared encryption keys for secure channels, file sharing, and administrative controls, positioning Keybase as a privacy-focused alternative to tools like Slack. This launch emphasized cryptographic auditability, enabling teams to verify member actions and access transparently.[12][13] From 2018 to 2019, Keybase integrated cryptocurrency wallet functionality to facilitate secure transactions within its ecosystem. Initial support for Bitcoin and Zcash addresses dated back to 2016, allowing users to prove ownership via identity proofs, but full wallet features expanded in 2018 with Stellar integration through a partnership with the Stellar Development Foundation. By May 2019, native Stellar wallets were rolled out across mobile and desktop clients, supporting in-chat transfers, multi-currency conversions, and low-cost transactions; identity proof support for QRL addresses was added for quantum-resistant verification. These wallets included a Stellar "spacedrop" airdrop program starting in mid-2019, distributing Lumens to verified users, but it was terminated in December 2019 due to rampant spam from fraudulent accounts exploiting the system.[14][15][16][17][18] In 2017, Keybase significantly expanded its Keybase Filesystem (KBFS), increasing free storage from an initial 10 GB to 250 GB per user. This update supported public, private, and team-based modes, allowing encrypted file storage and sharing without metadata leakage, and integrated seamlessly with client apps for cross-device access.[19][20] By 2020, Keybase had a significant following, particularly within security-focused communities like developers, journalists, and cryptocurrency enthusiasts who valued its emphasis on verifiable identities and end-to-end encryption.[21][22] This expansion underscored Keybase's evolution into a comprehensive secure communication platform.Acquisition by Zoom and subsequent decline
On May 7, 2020, Zoom Video Communications announced its acquisition of Keybase, Inc., a secure messaging and file-sharing service, for an undisclosed amount.[21][4][5] The deal marked Zoom's first acquisition and was positioned as a key step in the company's 90-day security plan, launched earlier that year to address vulnerabilities exposed by rapid growth.[21][23] The primary motivations for the acquisition stemmed from Zoom's need to strengthen end-to-end encryption amid the explosive demand for video conferencing during the COVID-19 pandemic, which saw daily meeting participants exceed 300 million, alongside widespread security criticisms including "Zoombombing" incidents.[21][24][25] Keybase's expertise in public-key cryptography and identity verification was seen as essential to scaling secure communications for Zoom's enterprise users, with the Keybase engineering team integrating directly into Zoom to accelerate these improvements.[21][26][27] In the immediate aftermath, Zoom leaders and Keybase co-founder Max Krohn stated that the teams would collaborate to determine the future of the Keybase product while prioritizing Zoom's encryption enhancements, crediting the acquisition with enabling a swift rollout of end-to-end encrypted meetings by October 2020.[26][28] However, development on standalone Keybase features effectively stalled, with resources redirected toward Zoom's platform; the service remained operational but received minimal updates beyond basic maintenance.[29][30] Subsequent years saw a gradual decommissioning of Keybase-specific functionalities. On March 1, 2023, the keybase.pub public file hosting service, which enabled static website deployment from Keybase Filesystem (KBFS) directories, was shut down, though underlying file storage via KBFS persisted for users.[31] In October 2023, support for the integrated cryptocurrency wallet, including Stellar (XLM) transactions, was discontinued, prompting users to export balances to external wallets.[32][33] By 2024 and into 2025, Keybase exhibited no active development, with its GitHub repositories showing negligible commit activity and no new releases since April 2023.[10] As of mid-2025, users reported broken public key verification tools, such as issues with uploading and verifying keys since June 2025, with no fixes issued; the client also remains vulnerable to unpatched issues in underlying libraries.[34][35] Community feedback highlighted persistent bugs and reliability issues, driving migrations to alternatives like Signal for messaging and IPFS for file sharing, while Zoom communications increasingly referred to Keybase as a legacy component integrated solely for cryptographic contributions.[6] No full service shutdown has been announced, but the platform's role has significantly diminished without further investment.[21]Core Concepts
Identity proofs and cryptography
Keybase's identity system relies on a signature chain, a tamper-evident log of cryptographic statements that records key delegations, revocations, and proofs. Users generate key pairs using the NaCl cryptographic library, featuring Curve25519 for encryption and Ed25519 for signing, with public keys published on keybase.io.[36] These keys enable users to create identity proofs by signing statements that link their Keybase account to external identities, such as social media profiles or DNS records, which are then posted directly on those platforms.[37] For compatibility with existing ecosystems, Keybase also supports generating or importing PGP key pairs, allowing them to participate in the signature chain for proofs and legacy use cases.[38] Verification occurs client-side through cryptographic checks of the signatures against the published proofs, ensuring no reliance on a central authority and enabling public auditability via Merkle trees that hash proofs into a verifiable structure.[39] Keybase supports dozens of proof types, facilitating verification across diverse platforms without requiring phone numbers or centralized trust. Examples include Twitter (via signed tweets), GitHub (via Gist signatures), Reddit (via signed posts), and Bitcoin addresses (via on-chain transactions), alongside DNS TXT records for domains and generic website proofs.[40] Each proof type employs platform-specific cryptographic methods—such as API-based posting or blockchain inscriptions—to bind the external identity to the user's Keybase public key, with clients independently confirming validity by fetching and validating the signed content.[41] This decentralized approach mitigates impersonation risks, as any alteration to a proof would invalidate the signature chain. All communications and data sharing in Keybase employ end-to-end encryption powered by the NaCl library, utilizing authenticated public-key encryption (via crypto_box) for confidentiality and integrity.[39] Forward secrecy is integrated for enhanced protection, particularly through ephemeral keys in exploding messages and a double-ratchet mechanism that periodically refreshes session keys, limiting exposure if a device key is compromised in the future.[42] Key management emphasizes user control, with private keys generated and stored locally on devices, encrypted by a single user passphrase using NaCl's SecretBox; no private keys are held centrally by Keybase servers.[36] Automatic key rotation occurs during device revocations—via per-user key (PUK) updates signed across remaining devices—and supports lazy cascading for teams, ensuring revoked keys cannot decrypt prior or future content without disrupting active sessions.[43] The robustness of these mechanisms was validated through independent security audits. In 2019, NCC Group conducted a comprehensive review of Keybase's protocols and implementations, identifying five issues, including one high-severity and three medium-severity issues (exploitable under various conditions including malicious server scenarios), all of which were promptly remediated, with the audit affirming strong protections against common attacks like key compromise and signature forgery.[44] Earlier evaluations, including internal reviews prior to major feature launches, further confirmed the system's resistance to man-in-the-middle and replay attacks, underscoring its reliance on battle-tested primitives from NaCl.[43]Software architecture and open-source aspects
Keybase's software is built primarily in Go for its backend services, command-line interface (CLI), and core cryptographic libraries, enabling efficient cross-platform compilation and performance-critical operations such as key management and proof verification.[45][46] The desktop graphical user interfaces (GUIs) utilize Electron, a framework that packages web technologies including JavaScript and shared React components, allowing for consistent rendering across platforms while leveraging the underlying Go-based service for secure networking and data handling.[45] For mobile applications on iOS and Android, Keybase employs React Native, facilitating code reuse between platforms and native performance through JavaScript-based rendering bridged to platform-specific components.[45] The overall architecture follows a client-server model, where clients perform all encryption and decryption operations locally to ensure end-to-end security, while servers manage non-sensitive tasks such as proof verification against public signature chains and directory services for user discovery.[46][36] This design prevents servers from accessing plaintext data or private keys, with all user content encrypted client-side before transmission.[39] Clients communicate with servers via a duplex RPC protocol over separate processes, optimizing for reliability in network interactions like fetching Merkle tree roots for verification.[46] Keybase provides cross-platform clients supporting Windows, macOS, Linux, iOS, and Android, alongside a dedicated CLI tool for advanced scripting and automation tasks.[47][45] The CLI, implemented in Go, offers command-line access to core functionalities and is particularly useful for server environments or power users requiring precise control over operations like key generation and proof publication.[48][46] Since its launch in 2014, the entire Keybase codebase has been open-sourced on GitHub under the New BSD (3-Clause) license, promoting transparency and auditability of its security implementations.[45] Community contributions were actively solicited and integrated through pull requests until 2020, when development largely ceased following the acquisition by Zoom, though the repository remains publicly accessible for review and forking.[45] Keybase integrates with Git to enable encrypted version control proofs, allowing users to host private repositories with end-to-end encryption while leveraging Git's distributed model for collaboration.[49] For efficient proof verification, the system employs Merkle trees to structure signature chains and filesystem metadata, enabling clients to validate data integrity and consistency with minimal server trust through compact proofs derived from tree roots.[50][39] This approach ensures tamper-evident publication of user identities and updates across the network.[51]User Features
Client applications
Keybase provides client applications across multiple platforms, enabling users to manage identities, communicate, and handle files securely. These applications are developed in a unified repository, supporting seamless cross-platform functionality while emphasizing ease of use for non-technical users. The desktop, mobile, and command-line interface (CLI) versions cater to different needs, from graphical interactions to scripted automation. The desktop applications are built using Electron, a framework for creating cross-platform graphical user interfaces with web technologies, and are available for Windows, macOS, and Linux. These apps facilitate key generation during initial account setup, where users create cryptographic key pairs to secure their identities. Users can also set up identity proofs by linking their Keybase account to external services like social media or websites directly through the interface. A key feature is the ability to mount the Keybase Filesystem (KBFS), allowing files to appear as local drives—such as in Finder on macOS or Explorer on Windows—for intuitive access and management. Mobile applications are developed for iOS and Android using React Native, providing on-the-go access to core functionalities like secure chats and file sharing. The iOS app, available via the App Store, enables users to manage identities, initiate encrypted conversations, and share files privately. Similarly, the Android version, distributed through Google Play, supports these features with a focus on mobile-optimized interactions. Both apps include push notifications to alert users of incoming messages, ensuring timely engagement without constant manual checking. The CLI tool, written in Go, serves as a lightweight, scriptable interface for advanced users and automation tasks. It supports key management operations, such as listing devices (keybase device list), adding new devices (keybase device add), removing revoked devices (keybase device remove), and generating backup paper keys (keybase paperkey). For file operations, it integrates with tools like kbfsfuse to mount KBFS volumes, enabling command-line access to encrypted storage. This tool is particularly useful for scripting workflows, such as encrypting files for specific users based on their verified proofs.
Installation involves a one-time download from the official site at keybase.io/download, with platform-specific installers for desktop and mobile apps, and package managers or binaries for the CLI on Linux distributions like Ubuntu or Fedora. Setup requires creating a username and linking the device via an initial key pair generation, with no mandatory email verification but optional addition of identity proofs to enhance account trustworthiness by connecting to public online presences. These apps integrate with end-to-end encrypted messaging and file sharing for a cohesive user experience.
The user interface has evolved significantly from Keybase's launch, initially emphasizing a command-line focus in 2014 for core identity and proof operations. By 2017, with the introduction of features like chat, the applications shifted toward polished graphical user interfaces, incorporating intuitive elements such as system tray icons on desktop and touch-friendly designs on mobile to broaden accessibility. As of August 2024, the latest client release addressed compatibility issues by upgrading the Electron version, fixing startup failures on recent Fedora and Ubuntu distributions.[52]
End-to-end encrypted messaging
Keybase introduced its end-to-end encrypted chat functionality on February 8, 2017, as a core feature integrated into the desktop and mobile clients.[11] The chat supports text messages up to 4,000 characters, attachments including images and files, and ephemeral messages that can be set to automatically delete after a specified period.[11] Messages are encrypted using symmetric keys derived from 32 random bytes, protected via the NaCl library's crypto_secretbox with XSalsa20 and Poly1305 for authentication.[41] Key exchange relies on Curve25519 for public-key encryption (via crypto_box) and Ed25519 for signing, with each device maintaining its own key pairs to ensure end-to-end security without server access to plaintext.[41] The system supports one-on-one conversations for private exchanges and group chats for multiple participants, with teams enabling organized channels that can accommodate up to 1,000 members at launch.[12] These conversation types leverage shared symmetric keys distributed to all participants, allowing seamless addition or removal of members while rekeying to maintain security.[41] Security is enhanced through device verification, where users confirm connected devices via a public signature chain that audits key exchanges and prevents unauthorized access.[11] Message detonation, or exploding messages, enables self-destructing content that automatically deletes after expiration (from 30 seconds to one week), with clients discarding both the message and its encryption keys for forward secrecy; in small teams of 100 or fewer members, pairwise MACs provide efficient authentication.[53] While servers store encrypted messages and limited metadata such as sender, recipients, message size, and channel ID, they cannot access content or full conversation details due to the client-side key management.[11] All chats are inherently tied to users' verified identities, which are proven through cryptographic proofs linked to social media accounts or other public keys, ensuring participants know exactly who they are communicating with without relying on usernames alone.[11] This integration prevents impersonation and allows messages to reference prior content for integrity checks, blocking server-side tampering like reordering or deletion.[41] Keybase chat lacks support for voice or video calls, distinguishing it from features in the acquiring company Zoom post-2020. Message history is fully preserved and syncs across devices upon login. File attachments in chats are handled via the Keybase Filesystem (KBFS) for secure, encrypted storage.[41]File sharing and storage
The Keybase Filesystem (KBFS), launched in February 2016, is a distributed, end-to-end encrypted filesystem that enables secure file storage and sharing integrated with Keybase's identity system. It employs block-level encryption to protect data, allowing users to store up to 250 GB of files for free without a paid upgrade option. KBFS operates as a global namespace, mounting as a virtual filesystem on user devices for seamless access, and its open-source implementation ensures transparency in its cryptographic operations.[54][2][54] Public files in KBFS are stored in the/keybase/[public](/page/public) directory and are readable by anyone without authentication, making them suitable for sharing proofs, portfolios, or static content. These files are signed but not encrypted, with access controlled by listing writers in the top-level folder (TLF) name. Prior to its discontinuation in March 2023, public files could be hosted as static websites via the keybase.pub domain, a service that allowed subdomain or custom domain publishing; however, the files themselves remain accessible through KBFS clients, though the web hosting functionality ended.[2][31]
Private files provide end-to-end encryption and are accessible only to designated key holders, stored in paths like /keybase/private/username for individual users or shared folders specified in the TLF name (e.g., user1,user2). These files are mounted as local folders on the user's device—such as /Volumes/Keybase on macOS or /keybase on Linux—enabling on-demand streaming without full synchronization unless explicitly enabled for offline access. Access is restricted to readers and writers defined in the TLF, ensuring privacy even from Keybase servers.[2][55]
Team files extend private sharing to Keybase teams, stored in /keybase/team/teamname, where access is governed by team membership and uses keys derived from the team's cryptographic hierarchy, including support for subgroups. These folders support versioning, allowing users to access file revisions up to two weeks prior via command-line flags like -time or -rev, and include access controls tied to team roles without relying on POSIX permissions. This enables collaborative storage with granular sharing within organizations.[2][55]
Technically, KBFS encrypts files at the block level using per-block keys randomly generated for each 32 KB block, which are then derived into encryption keys and nonces via HMAC-SHA512 from the TLF's secret key—itself generated from user or team private keys. Blocks are encrypted with NaCl's SecretBox authenticated encryption, ensuring both confidentiality and integrity, while metadata like reader/writer lists remains unencrypted for access verification. Servers store only ciphertext and cannot decrypt or access plaintext, as all keys remain client-side.[39]
Teams and Collaboration
Team creation and management
Teams in Keybase are created by an owner registering a unique, lowercase name consisting of letters, numbers, and underscores, which cannot be changed once established.[12] The creation process involves inviting initial members via Keybase usernames, emails, phone numbers, or social handles, with invitees required to have or create a Keybase account to join.[56] Upon formation, each team generates a unique shared secret key, derived through an XOR combination of user-encrypted key shares and server-stored key halves, ensuring that no single entity, including Keybase servers, possesses the complete decryption key.[57] Keybase defines distinct roles to govern team access and permissions, providing granular control over operations. Owners hold full authority, including the ability to delete the root team, add or remove members, assign roles, and create subteams. Admins, appointed by owners, manage most administrative functions such as inviting or removing members, rotating keys, and creating subteams, but cannot delete the root team. Writers possess read and write access to team chats, files, and other collaborative features, while readers have read and write access to chats but are limited to read-only access to files.[57] The following table outlines key permissions by role:| Role | Add/Remove Members | Create Subteams | Rotate Keys | Delete Root Team | Chat/File Access |
|---|---|---|---|---|---|
| Owners | Yes | Yes | Yes | Yes | Read/Write |
| Admins | Yes | Yes | Yes | No | Read/Write |
| Writers | No | No | No | No | Read/Write |
| Readers | No | No | No | No | Read/Write (files read-only) |
parentteam.subteam), allowing hierarchical structures while maintaining data isolation between levels.[57] Admins of parent teams act as implicit admins for subteams but require explicit addition for data access, enhancing privacy and control.[57]
Team-specific functionalities
Keybase teams provided persistent chat channels for collaborative discussions, functioning as dedicated rooms within a team where members could engage in threaded conversations and perform searches across message history. These channels were end-to-end encrypted and accessible to all team members, enabling real-time or asynchronous communication without external intermediaries. Unlike individual chats, team channels supported structured organization, such as topic-specific rooms (e.g., #design or #hr), and integrated seamlessly with team file storage for sharing documents during discussions.[56][12] Access controls in Keybase teams offered granular permissions through defined roles, including Owners (full administrative powers, such as deleting the team), Admins (managing members and subteams), Writers (read/write access to chats and files), and Readers (read/write access to chats, read-only for files). Key rotation was automated upon member removal or device revocation, updating shared encryption keys without data loss, as the system used per-team keys derived from a secure seed encrypted for active members.[57][56] Integrations enhanced team workflows, such as linking GitHub proofs to verify team repositories and enable encrypted Git operations within team spaces. Prior to 2023, teams could utilize cryptocurrency wallets, particularly on the Stellar network, to manage shared treasuries for secure, collective handling of digital assets like Lumens (XLM), with end-to-end encryption protecting transactions and balances. Slack imports allowed teams to migrate existing channels, preserving conversation history in an encrypted format.[12][59][16] Teams facilitated secure file collaboration and internal communications for companies and communities, such as coordinating sensitive projects or maintaining private discussion forums. Early adopters, including journalists from organizations like the Freedom of the Press Foundation, used teams for source protection and collaborative reporting, leveraging encrypted channels to share research securely without risking exposure. For instance, newsrooms employed subteams for investigative groups, ensuring compartmentalized access to drafts and evidence.[22][56] Limitations included the absence of an external API for team operations after 2020, restricting programmatic integrations to local client interfaces and hindering custom automation. Channels were limited to around 10,000 members to maintain performance, though teams could support larger memberships; storage was limited to 100 GB per team for files and attachments.[56][4] Following the 2020 acquisition by Zoom, team features have seen minimal updates as of 2025.[4][6]Legacy and Current Status
Impact and user adoption
Keybase demonstrated substantial influence in making secure communication more accessible, particularly by simplifying the adoption of public-key cryptography like PGP for non-experts. Launched in 2014, it addressed longstanding usability barriers in PGP by allowing users to verify identities through social media proofs and other public anchors, enabling seamless encryption without requiring advanced technical knowledge. This approach pioneered a user-friendly pathway to PGP integration, broadening its application beyond niche technical circles to everyday secure messaging and file sharing.[60] The platform saw rapid user base expansion, becoming particularly popular among developers, journalists, and cryptocurrency enthusiasts by 2020. Developers appreciated its open-source tools, such as encrypted Git repositories, which facilitated secure collaboration in open-source projects. Journalists adopted Keybase for protecting sources through end-to-end encrypted chats, secure file sharing in private folders, and identity verification to prevent impersonation, as recommended by organizations like the Freedom of the Press Foundation. Early cryptocurrency communities embraced it for its integration with tools like Stellar's wallet airdrops and secure key management, fostering trust in decentralized ecosystems.[61][22][62][63] Keybase's community thrived through active GitHub repositories and discussions, where users contributed to and debated features, alongside annual blog posts on keybase.io that documented updates and cryptographic advancements until 2020. This engagement highlighted its role in building a collaborative ecosystem around secure tools. The platform received recognition from privacy advocates, including the Electronic Frontier Foundation, which cited Keybase as an example of effective end-to-end encrypted messaging in guidance for mutual aid organizers and secure virtual collaboration.[64][65][66]Post-acquisition changes and availability
Following its acquisition by Zoom Video Communications in May 2020, Keybase has seen limited development activity, with the source code repository remaining publicly available on GitHub but primarily focused on maintenance rather than new features.[4][45] As of November 2025, core client applications for macOS, Windows, Linux, iOS, and Android are still downloadable from the official Keybase website, allowing users to install and run the software on supported platforms.[47] End-to-end encrypted messaging and private Keybase Filesystem (KBFS) storage remain functional for existing users, enabling secure chat and file sharing, though these components receive no active enhancement beyond occasional security fixes.[1] Public hosting services, such as the keybase.pub feature for serving static websites from public folders, were discontinued in early 2023, with files preserved in KBFS but no longer accessible via web hosting.[67] Since the acquisition, Keybase has received only minor software updates and no major feature releases, with the latest client version (v6.5.1) released on April 28, 2025, and ongoing security patches addressing vulnerabilities as recently as November 2025.[10][68] Intermittent service outages have been noted in user reports from 2023 onward, often related to server maintenance, while integration with Zoom's ecosystem is restricted to internal enterprise use cases rather than public availability.[69] Zoom's ownership ensures legal continuity under its terms of service, updated as recently as September 2023, but the platform operates as a legacy tool without dedicated investment.[70] Users facing potential end-of-life concerns are guided by Keybase's documentation to export private keys and files using built-in commands likekeybase pgp [export](/page/Export) for PGP keys and KBFS tools for data retrieval, preserving access to encrypted content outside the service.[71] Community discussions and reviews recommend transitioning to alternatives such as Signal for messaging or Matrix for decentralized collaboration, citing Keybase's stagnant development as a key factor.[72] As of November 2025, Zoom has announced no plans for reviving or expanding Keybase, though sporadic security patches continue to address vulnerabilities.[73][6]