Fact-checked by Grok 2 weeks ago

Keybase

Keybase is an open-source, end-to-end encrypted platform for secure messaging, , and identity verification, leveraging to map users' social media accounts to cryptographic keys in a publicly auditable way. Founded in by software engineers Chris Coyne and Max Krohn, Keybase aimed to simplify the use of by allowing individuals to prove ownership of online identities—such as , , or accounts—through cryptographic proofs, thereby building trust without relying on centralized authorities. The service provides features like private team chats, self-destructing messages with timers, and the Keybase Filesystem (KBFS), a distributed, encrypted system that operates under a global namespace while ensuring only authorized users can access files. In May 2020, Keybase was acquired by in its first-ever purchase, valued for its encryption expertise to bolster Zoom's capabilities amid growing security demands during the . As of November 2025, Keybase remains operational under , supporting cross-platform access on desktop, mobile, and via , though development has slowed post-acquisition and it has faced criticism for concerns related to Zoom's ownership, complicated , and a small user base.

History

Founding and early development

Keybase was founded by Chris Coyne and Max Krohn, both of whom had previously co-founded the online dating platform and sold it to in 2011. Drawing from their experience in building user-friendly web applications, Coyne and Krohn aimed to address longstanding barriers in tools. The company was incorporated as Keybase, Inc. in in 2014, initially operating as a small team with limited resources and no formal at launch. The platform launched publicly in early as a free, open-source service designed to democratize . At its core, Keybase sought to simplify the discovery and verification of PGP keys by allowing users to link them to established identities, such as and accounts. This approach eliminated the need for manual key exchanges or reliance on unverified directories, making encryption more approachable for non-experts while maintaining cryptographic integrity through auditable proofs posted directly to those platforms. Keybase emerged amid heightened public awareness of following Edward Snowden's 2013 revelations, but it specifically targeted the usability hurdles that had long plagued PGP since its inception in the . Traditional PGP workflows involved cumbersome processes like attending in-person key signing parties to build a "" or manually validating fingerprints, which deterred widespread adoption. By leveraging social proofs, Keybase reduced these frictions, enabling users to verify identities with a single click while ensuring that any impersonation would require compromising multiple online accounts. Early traction came quickly, with the service gaining viral attention on shortly after launch. To support further development, Keybase secured its first major funding in July 2015: a $10.8 million led by , with participation from other investors including Stellar Development Foundation. This capital enabled the team to expand beyond the initial key directory prototype, though the focus remained on refining core identity verification tools in the platform's formative years.

Key feature launches and expansions

Following its initial launch, Keybase expanded its client offerings to enhance accessibility across devices. The desktop application was first introduced for macOS in early 2015, providing a alongside the existing command-line for and macOS users. Windows support followed in mid-2016 with a native client, while received improved graphical capabilities shortly thereafter, enabling broader adoption among developers and security enthusiasts. In February 2017, Keybase launched end-to-end encrypted chat, marking a significant pivot from identity verification to real-time communication. This feature supported one-on-one conversations and small group chats, integrated directly into the existing clients without requiring separate apps, and leveraged users' cryptographic identities for seamless, secure interactions. Building on this momentum, September 2017 saw the introduction of Keybase Teams, designed for organizational collaboration. Teams allowed groups to create shared encryption keys for secure channels, , and administrative controls, positioning Keybase as a privacy-focused alternative to tools like . This launch emphasized cryptographic auditability, enabling teams to verify member actions and access transparently. From 2018 to 2019, Keybase integrated functionality to facilitate secure transactions within its ecosystem. Initial support for and addresses dated back to 2016, allowing users to prove ownership via identity proofs, but full wallet features expanded in 2018 with Stellar integration through a partnership with the Stellar Development Foundation. By May 2019, native Stellar wallets were rolled out across mobile and desktop clients, supporting in-chat transfers, multi-currency conversions, and low-cost transactions; identity proof support for QRL addresses was added for quantum-resistant verification. These wallets included a Stellar "spacedrop" program starting in mid-2019, distributing Lumens to verified users, but it was terminated in December 2019 due to rampant from fraudulent accounts exploiting the system. In , Keybase significantly expanded its Keybase Filesystem (KBFS), increasing free from an initial 10 GB to 250 GB per user. This update supported public, private, and team-based modes, allowing encrypted file and without metadata leakage, and integrated seamlessly with client apps for cross-device . By , Keybase had a significant following, particularly within security-focused communities like developers, journalists, and enthusiasts who valued its emphasis on verifiable identities and . This expansion underscored Keybase's evolution into a comprehensive platform.

Acquisition by Zoom and subsequent decline

On May 7, 2020, announced its acquisition of Keybase, Inc., a secure messaging and file-sharing service, for an undisclosed amount. The deal marked 's first acquisition and was positioned as a key step in the company's 90-day security plan, launched earlier that year to address vulnerabilities exposed by rapid growth. The primary motivations for the acquisition stemmed from Zoom's need to strengthen amid the explosive demand for video conferencing during the , which saw daily meeting participants exceed 300 million, alongside widespread security criticisms including "" incidents. Keybase's expertise in and identity verification was seen as essential to scaling secure communications for Zoom's users, with the Keybase integrating directly into Zoom to accelerate these improvements. In the immediate aftermath, Zoom leaders and Keybase co-founder Max Krohn stated that the teams would collaborate to determine the future of the Keybase product while prioritizing 's encryption enhancements, crediting the acquisition with enabling a swift rollout of end-to-end encrypted meetings by October 2020. However, development on standalone Keybase features effectively stalled, with resources redirected toward 's platform; the service remained operational but received minimal updates beyond basic maintenance. Subsequent years saw a gradual decommissioning of Keybase-specific functionalities. On March 1, 2023, the keybase.pub public , which enabled static website deployment from Keybase Filesystem (KBFS) directories, was shut down, though underlying file storage via KBFS persisted for users. In October 2023, support for the integrated , including Stellar (XLM) transactions, was discontinued, prompting users to export balances to external wallets. By 2024 and into 2025, Keybase exhibited no active development, with its repositories showing negligible commit activity and no new releases since April 2023. As of mid-2025, users reported broken public verification tools, such as issues with uploading and verifying keys since June 2025, with no fixes issued; the client also remains vulnerable to unpatched issues in underlying libraries. Community feedback highlighted persistent bugs and reliability issues, driving migrations to alternatives like Signal for messaging and IPFS for , while increasingly referred to Keybase as a component integrated solely for cryptographic contributions. No full shutdown has been announced, but the platform's has significantly diminished without further investment.

Core Concepts

Identity proofs and cryptography

Keybase's identity system relies on a signature chain, a tamper-evident log of cryptographic statements that records key delegations, revocations, and proofs. Users generate key pairs using the NaCl cryptographic library, featuring for encryption and Ed25519 for signing, with public keys published on keybase.io. These keys enable users to create proofs by signing statements that link their Keybase account to external identities, such as profiles or DNS records, which are then posted directly on those platforms. For compatibility with existing ecosystems, Keybase also supports generating or importing PGP key pairs, allowing them to participate in the signature chain for proofs and legacy use cases. Verification occurs client-side through cryptographic checks of the signatures against the published proofs, ensuring no reliance on a central authority and enabling public auditability via Merkle trees that hash proofs into a verifiable structure. Keybase supports dozens of proof types, facilitating verification across diverse platforms without requiring phone numbers or centralized trust. Examples include (via signed tweets), (via Gist signatures), (via signed posts), and addresses (via on-chain transactions), alongside DNS TXT records for domains and generic website proofs. Each proof type employs platform-specific cryptographic methods—such as API-based posting or inscriptions—to bind the external to the user's Keybase public key, with clients independently confirming validity by fetching and validating the signed content. This decentralized approach mitigates impersonation risks, as any alteration to a proof would invalidate the signature chain. All communications and data sharing in Keybase employ powered by the NaCl library, utilizing authenticated public-key encryption (via crypto_box) for and . is integrated for enhanced protection, particularly through ephemeral keys in exploding messages and a double-ratchet mechanism that periodically refreshes session keys, limiting exposure if a device key is compromised in the future. Key management emphasizes user control, with private keys generated and stored locally on devices, encrypted by a single user using NaCl's SecretBox; no private keys are held centrally by Keybase servers. Automatic key rotation occurs during device revocations—via per-user key (PUK) updates signed across remaining devices—and supports lazy cascading for teams, ensuring revoked keys cannot decrypt prior or future content without disrupting active sessions. The robustness of these mechanisms was validated through independent security audits. In 2019, conducted a comprehensive review of Keybase's protocols and implementations, identifying five issues, including one high-severity and three medium-severity issues (exploitable under various conditions including malicious server scenarios), all of which were promptly remediated, with the audit affirming strong protections against common attacks like key compromise and signature forgery. Earlier evaluations, including internal reviews prior to major feature launches, further confirmed the system's resistance to man-in-the-middle and replay attacks, underscoring its reliance on battle-tested primitives from NaCl.

Software architecture and open-source aspects

Keybase's software is built primarily in Go for its backend services, (CLI), and core cryptographic libraries, enabling efficient cross-platform compilation and performance-critical operations such as and proof verification. The desktop graphical user interfaces (GUIs) utilize , a framework that packages web technologies including and shared components, allowing for consistent rendering across platforms while leveraging the underlying Go-based service for secure networking and data handling. For mobile applications on and , Keybase employs , facilitating code reuse between platforms and native performance through JavaScript-based rendering bridged to platform-specific components. The overall architecture follows a client-server model, where clients perform all encryption and decryption operations locally to ensure end-to-end security, while servers manage non-sensitive tasks such as proof verification against public signature chains and directory services for user discovery. This design prevents servers from accessing plaintext data or private keys, with all user content encrypted client-side before transmission. Clients communicate with servers via a duplex RPC protocol over separate processes, optimizing for reliability in network interactions like fetching roots for verification. Keybase provides cross-platform clients supporting Windows, macOS, , , and , alongside a dedicated CLI tool for advanced scripting and automation tasks. The CLI, implemented in Go, offers command-line access to core functionalities and is particularly useful for server environments or power users requiring precise control over operations like and proof publication. Since its launch in 2014, the entire Keybase codebase has been open-sourced on under the New BSD (3-Clause) license, promoting transparency and auditability of its security implementations. Community contributions were actively solicited and integrated through pull requests until , when development largely ceased following the acquisition by , though the repository remains publicly accessible for review and forking. Keybase integrates with to enable encrypted proofs, allowing users to host private repositories with while leveraging Git's distributed model for . For efficient proof verification, the system employs Merkle trees to structure chains and filesystem metadata, enabling clients to validate and with minimal server trust through compact proofs derived from tree roots. This approach ensures tamper-evident publication of user identities and updates across the network.

User Features

Client applications

Keybase provides client applications across multiple platforms, enabling users to manage identities, communicate, and handle files securely. These applications are developed in a unified repository, supporting seamless cross-platform functionality while emphasizing ease of use for non-technical users. The desktop, mobile, and command-line interface (CLI) versions cater to different needs, from graphical interactions to scripted automation. The desktop applications are built using Electron, a framework for creating cross-platform graphical user interfaces with web technologies, and are available for Windows, macOS, and Linux. These apps facilitate key generation during initial account setup, where users create cryptographic key pairs to secure their identities. Users can also set up identity proofs by linking their Keybase account to external services like social media or websites directly through the interface. A key feature is the ability to mount the Keybase Filesystem (KBFS), allowing files to appear as local drives—such as in Finder on macOS or Explorer on Windows—for intuitive access and management. Mobile applications are developed for and using , providing on-the-go access to core functionalities like secure chats and . The app, available via the , enables users to manage identities, initiate encrypted conversations, and share files privately. Similarly, the version, distributed through , supports these features with a focus on mobile-optimized interactions. Both apps include push notifications to alert users of incoming messages, ensuring timely engagement without constant manual checking. The CLI tool, written in Go, serves as a lightweight, scriptable interface for advanced users and automation tasks. It supports key management operations, such as listing devices (keybase device list), adding new devices (keybase device add), removing revoked devices (keybase device remove), and generating backup paper keys (keybase paperkey). For file operations, it integrates with tools like kbfsfuse to mount KBFS volumes, enabling command-line access to encrypted storage. This tool is particularly useful for scripting workflows, such as encrypting files for specific users based on their verified proofs. Installation involves a one-time from the site at keybase.io/download, with platform-specific installers for and apps, and package managers or binaries for the CLI on distributions like or . Setup requires creating a username and linking the device via an initial key pair generation, with no mandatory but optional addition of proofs to enhance trustworthiness by connecting to public online presences. These apps integrate with end-to-end encrypted messaging and for a cohesive . The has evolved significantly from Keybase's launch, initially emphasizing a command-line focus in for core identity and proof operations. By , with the introduction of features like , the applications shifted toward polished graphical user interfaces, incorporating intuitive elements such as system tray icons on and touch-friendly designs on to broaden . As of August 2024, the latest client release addressed compatibility issues by upgrading the version, fixing startup failures on recent and distributions.

End-to-end encrypted messaging

Keybase introduced its end-to-end encrypted functionality on February 8, 2017, as a core feature integrated into the and clients. The supports text messages up to 4,000 characters, attachments including images and files, and ephemeral messages that can be set to automatically delete after a specified period. Messages are encrypted using symmetric keys derived from 32 random bytes, protected via the NaCl library's crypto_secretbox with XSalsa20 and Poly1305 for authentication. Key exchange relies on for public-key encryption (via crypto_box) and Ed25519 for signing, with each device maintaining its own key pairs to ensure end-to-end security without server access to . The system supports one-on-one for private exchanges and group for multiple participants, with teams enabling organized that can accommodate up to 1,000 members at launch. These conversation types shared symmetric distributed to all participants, allowing seamless addition or removal of members while to maintain . is enhanced through verification, where users confirm connected via a public signature chain that audits key exchanges and prevents unauthorized . Message detonation, or exploding messages, enables self-destructing content that automatically deletes after expiration (from 30 seconds to one week), with clients discarding both the message and its for ; in small teams of 100 or fewer members, pairwise MACs provide efficient . While servers store encrypted messages and limited such as sender, recipients, message size, and ID, they cannot content or full conversation details due to the client-side key management. All chats are inherently tied to users' verified identities, which are proven through cryptographic proofs linked to accounts or other public keys, ensuring participants know exactly who they are communicating with without relying on usernames alone. This prevents impersonation and allows messages to prior content for checks, blocking server-side tampering like reordering or deletion. Keybase chat lacks support for voice or video calls, distinguishing it from features in the acquiring company post-2020. Message history is fully preserved and syncs across devices upon . File attachments in chats are handled via the Keybase Filesystem (KBFS) for secure, encrypted .

File sharing and storage

The Keybase Filesystem (KBFS), launched in February 2016, is a distributed, end-to-end encrypted filesystem that enables secure file storage and sharing integrated with Keybase's identity system. It employs block-level encryption to protect data, allowing users to store up to 250 GB of files for free without a paid option. KBFS operates as a global namespace, mounting as a virtual filesystem on user devices for seamless access, and its open-source implementation ensures transparency in its cryptographic operations. Public files in KBFS are stored in the /keybase/[public](/page/public) directory and are readable by anyone without , making them suitable for sharing proofs, portfolios, or static content. These files are signed but not encrypted, with access controlled by listing writers in the top-level folder (TLF) name. Prior to its discontinuation in March 2023, public files could be hosted as static websites via the keybase.pub , a service that allowed or custom publishing; however, the files themselves remain accessible through KBFS clients, though the web hosting functionality ended. Private files provide and are accessible only to designated key holders, stored in paths like /keybase/private/username for individual users or shared folders specified in the TLF name (e.g., user1,user2). These files are mounted as local folders on the user's device—such as /Volumes/Keybase on macOS or /keybase on —enabling on-demand streaming without full synchronization unless explicitly enabled for offline access. Access is restricted to readers and writers defined in the TLF, ensuring even from Keybase servers. Team files extend private sharing to Keybase teams, stored in /keybase/team/teamname, where access is governed by team membership and uses keys derived from the team's cryptographic , including support for subgroups. These folders support versioning, allowing users to access file revisions up to two weeks prior via command-line flags like -time or -rev, and include access controls tied to team roles without relying on permissions. This enables collaborative storage with granular within organizations. Technically, KBFS encrypts files at the block level using per-block keys randomly generated for each 32 KB block, which are then derived into encryption keys and nonces via HMAC-SHA512 from the TLF's secret key—itself generated from user or team private keys. Blocks are encrypted with NaCl's SecretBox , ensuring both and , while metadata like reader/writer lists remains unencrypted for access verification. Servers store only and cannot decrypt or access , as all keys remain client-side.

Teams and Collaboration

Team creation and management

Teams in Keybase are created by an owner registering a unique, lowercase name consisting of letters, numbers, and underscores, which cannot be changed once established. The creation process involves inviting initial members via Keybase usernames, emails, phone numbers, or social handles, with invitees required to have or create a Keybase to join. Upon formation, each team generates a unique key, derived through an XOR combination of user-encrypted key shares and server-stored key halves, ensuring that no single entity, including Keybase servers, possesses the complete decryption key. Keybase defines distinct roles to govern team access and permissions, providing granular control over operations. Owners hold full authority, including the ability to delete the root team, add or remove members, assign roles, and create subteams. Admins, appointed by owners, manage most administrative functions such as inviting or removing members, rotating keys, and creating subteams, but cannot delete the root team. Writers possess read and write access to team chats, files, and other collaborative features, while readers have read and write access to chats but are limited to read-only access to files. The following table outlines key permissions by role:
RoleAdd/Remove MembersCreate SubteamsRotate KeysDelete Root TeamChat/File Access
OwnersYesYesYesYesRead/Write
AdminsYesYesYesNoRead/Write
WritersNoNoNoNoRead/Write
ReadersNoNoNoNoRead/Write (files read-only)
Administration of teams is facilitated through client applications or command-line interfaces, allowing owners and admins to add or remove members—actions that are cryptographically signed and announced in team chat for . Key rotation is a critical tool, automatically triggered or manually initiated when a member leaves, a is revoked, or security concerns arise, updating the shared to exclude unauthorized access while re-encrypting team data. Retention policies can be configured for messages, with options to auto-delete content after intervals ranging from 30 seconds to 365 days or retain indefinitely, applied at the team or channel level. Audit capabilities are embedded via team chains, which log all administrative changes immutably, and the "box " tool, which periodically verifies key assignments against membership and alerts users to discrepancies, potentially "jailing" teams until resolved. Security for teams relies on end-to-end encryption of all using team-specific keys, with private components residing solely on user devices and never stored centrally. This prevents server-side decryption, even by Keybase operators, and ensures that only authorized members can content, as verified through cryptographic proofs in the team's signature chain. For in large organizations, Keybase supports nested subteams—private subgroups within a team—identified by pseudonyms (e.g., parentteam.subteam), allowing hierarchical structures while maintaining isolation between levels. Admins of teams act as implicit admins for subteams but require explicit addition for access, enhancing and .

Team-specific functionalities

Keybase teams provided persistent chat channels for collaborative discussions, functioning as dedicated rooms within a team where members could engage in threaded conversations and perform searches across message history. These channels were end-to-end encrypted and accessible to all team members, enabling real-time or asynchronous communication without external intermediaries. Unlike individual chats, team channels supported structured organization, such as topic-specific rooms (e.g., #design or #hr), and integrated seamlessly with team file storage for sharing documents during discussions. Access controls in Keybase teams offered granular permissions through defined roles, including Owners (full administrative powers, such as deleting the team), Admins (managing members and subteams), Writers (read/write access to chats and files), and Readers (read/write access to chats, read-only for files). Key rotation was automated upon member removal or device revocation, updating shared keys without , as the used per-team keys derived from a secure encrypted for active members. Integrations enhanced team workflows, such as linking proofs to verify team repositories and enable encrypted Git operations within team spaces. Prior to 2023, teams could utilize wallets, particularly on the Stellar network, to manage shared treasuries for secure, collective handling of digital assets like Lumens (XLM), with protecting transactions and balances. Slack imports allowed teams to migrate existing channels, preserving conversation history in an encrypted format. Teams facilitated secure file collaboration and internal communications for companies and communities, such as coordinating sensitive projects or maintaining private discussion forums. Early adopters, including journalists from organizations like the , used teams for source protection and collaborative reporting, leveraging encrypted channels to share research securely without risking exposure. For instance, newsrooms employed subteams for investigative groups, ensuring compartmentalized access to drafts and evidence. Limitations included the absence of an external for operations after , restricting programmatic integrations to local client interfaces and hindering custom automation. Channels were limited to around 10,000 members to maintain performance, though could support larger memberships; storage was limited to 100 GB per for files and attachments. Following the acquisition by , features have seen minimal updates as of 2025.

Legacy and Current Status

Impact and user adoption

Keybase demonstrated substantial influence in making more accessible, particularly by simplifying the adoption of like PGP for non-experts. Launched in , it addressed longstanding usability barriers in PGP by allowing users to verify identities through proofs and other public anchors, enabling seamless without requiring advanced technical knowledge. This approach pioneered a user-friendly pathway to PGP integration, broadening its application beyond niche technical circles to everyday secure messaging and . The platform saw rapid user base expansion, becoming particularly popular among developers, journalists, and enthusiasts by 2020. Developers appreciated its open-source tools, such as encrypted repositories, which facilitated secure collaboration in open-source projects. Journalists adopted Keybase for protecting sources through end-to-end encrypted chats, secure in private folders, and identity verification to prevent impersonation, as recommended by organizations like the . Early communities embraced it for its integration with tools like Stellar's wallet airdrops and secure key management, fostering trust in decentralized ecosystems. Keybase's community thrived through active GitHub repositories and discussions, where users contributed to and debated features, alongside annual blog posts on keybase.io that documented updates and cryptographic advancements until 2020. This engagement highlighted its role in building a collaborative ecosystem around secure tools. The platform received recognition from privacy advocates, including the Electronic Frontier Foundation, which cited Keybase as an example of effective end-to-end encrypted messaging in guidance for mutual aid organizers and secure virtual collaboration.

Post-acquisition changes and availability

Following its acquisition by in May 2020, Keybase has seen limited development activity, with the source code repository remaining publicly available on but primarily focused on maintenance rather than new features. As of November 2025, core client applications for macOS, Windows, , iOS, and are still downloadable from the official Keybase website, allowing users to install and run the software on supported platforms. End-to-end encrypted messaging and private Keybase Filesystem (KBFS) storage remain functional for existing users, enabling secure chat and , though these components receive no active enhancement beyond occasional security fixes. Public hosting services, such as the keybase.pub feature for serving static websites from public folders, were discontinued in early 2023, with files preserved in KBFS but no longer accessible via web hosting. Since the acquisition, Keybase has received only minor software updates and no major feature releases, with the latest client version (v6.5.1) released on April 28, 2025, and ongoing security patches addressing vulnerabilities as recently as November 2025. Intermittent service outages have been noted in user reports from 2023 onward, often related to server maintenance, while integration with Zoom's ecosystem is restricted to internal use cases rather than availability. Zoom's ownership ensures legal continuity under its , updated as recently as September 2023, but the platform operates as a legacy tool without dedicated investment. Users facing potential end-of-life concerns are guided by Keybase's to keys and files using built-in commands like keybase pgp [export](/page/Export) for PGP keys and KBFS tools for , preserving to encrypted outside the service. discussions and reviews recommend transitioning to alternatives such as Signal for messaging or for decentralized collaboration, citing Keybase's stagnant development as a key factor. As of November 2025, Zoom has announced no plans for reviving or expanding Keybase, though sporadic security patches continue to address vulnerabilities.

References

  1. [1]
    Keybase
    Keybase is secure messaging and file-sharing.​​ We use public key cryptography to ensure your messages stay private. Even we can't read your chats.Install Keybase · Encrypt · Keybase Blog · Docs
  2. [2]
    Understanding the Keybase Filesystem
    The Keybase filesystem (KBFS) is a distributed filesystem with end-to-end encryption and a global namespace. The KBFS code is open source.
  3. [3]
    Zoom Acquires Keybase and Announces Goal of Developing the ...
    May 7, 2020 · Since its launch in 2014, Keybase's team of exceptional engineers has built a secure messaging and file-sharing service leveraging their ...
  4. [4]
    Keybase - Crunchbase Company Profile & Funding
    Keybase offers end-to-end encrypted chat, file-sharing, and code-hosting all based on a cryptographic platform. Acquired by. Zoom Logo. Zoom.
  5. [5]
    Keybase joins Zoom
    May 7, 2020 · Zoom acquired Keybase. Keybase's initial priority is to improve Zoom's security, with no specific plans for the Keybase app yet.
  6. [6]
    Zoom buys Keybase in first deal as part of plan to fix security - CNBC
    May 7, 2020 · Zoom has acquired security start-up Keybase, the first purchase in the company's nine-year history. With in-person dealmaking off the table ...
  7. [7]
    Keybase Review 2025 — The Pros and Cons - CyberInsider
    Jan 29, 2025 · Keybase is a secure messaging and file-sharing service. It is a centralized system that applies end-to-end (E2E) encryption to every message you send and every ...
  8. [8]
    OkCupid's Founders Want to Bring Encrypted Email to the Masses
    Apr 29, 2014 · To place a fake key on Keybase, someone would have to hack all of your accounts and place the fake key on each of them. That's not ...Missing: blog | Show results with:blog
  9. [9]
    Founder Interviews: Max Krohn of Keybase - Hackernoon
    Oct 8, 2019 · I'm Max Krohn, CEO and co-founder of Keybase. I received a PhD in computer science from MIT in 2008, focusing on operating systems and security.
  10. [10]
    Keybase raises $10.8M
    Jul 15, 2015 · Adam Ludwin, founder & CEO of Chain.com; Alexis Ohanian, co-founder and executive chair, Reddit; Anna & Andrew Yaeger, great friends for life ...
  11. [11]
    Releases · keybase/client - GitHub
    Aug 21, 2024 · Releases: keybase/client ; v6.5.1. Apr 28 · v6.5.1 ; v6.4.0. Aug 21, 2024 · v6.4.0 ; v6.3.1. Jun 4, 2024 · v6.3.1 ; v6.2.8. Mar 6, 2024 · v6.2.8 ; v6.2.4.
  12. [12]
    Introducing Keybase Chat
    We're launching an end-to-end encrypted chat built into Keybase (downloadable here; source code here). It's easier to use than other crypto apps. It's ...
  13. [13]
    Introducing Keybase Teams
    September 18, 2017. Introducing Keybase Teams. A BIG DAY FOR KEYBASE! Today we're launching the alpha of Keybase teams. It's the most important project in ...
  14. [14]
    Keybase launches fully encrypted Slack-like communications tool
    and it's free. Ron Miller. 7:01 AM PDT · September 18, 2017.
  15. [15]
    Keybase chooses Zcash
    Nov 17, 2016 · Zcash is a digital simulation of real, physical dollars. And because an address can be published with privacy, it's lower friction that bitcoin.Missing: 2018 | Show results with:2018
  16. [16]
    Keybase is now supported by the Stellar Development Foundation
    Mar 8, 2018 · The nonprofit Stellar.org is now funding Keybase. If you follow cryptocurrencies, you might know of Lumens. Later this year we will release ...
  17. [17]
    Stellar wallets for all Keybase users
    May 14, 2019 · Keybase hides Stellar addresses, syncs keys securely, offers automatic amount conversion, in-chat sending, and fast, cheap transactions.
  18. [18]
    Stellar Tried to Give Away 2B XLM Tokens on Keybase ... - CoinDesk
    Dec 13, 2019 · Spammers started showing up on Keybase as soon as Stellar announced a giant airdrop on the encryption app. They went away as soon as word went out that the ...
  19. [19]
    Keybase Filesystem Documents
    No readable text found in the HTML.<|separator|>
  20. [20]
    Lost 250 GB of Space · Issue #1381 · keybase/kbfs - GitHub
    Dec 7, 2017 · That was not a new partition on your local drive. It is 250 GB of new space that we give you for free, that is stored in the cloud, not locally.
  21. [21]
    Keybase for beginners - Freedom of the Press Foundation
    May 10, 2021 · Keybase simplifies the process of sharing files and having conversations securely. Keybase is end-to-end encrypted, meaning that only you and your ...
  22. [22]
    Zoom Acquires Keybase and Announces Goal of Developing the
    May 7, 2020 · Zoom Video Communications, Inc. (NASDAQ: ZM) and Keybase today announced that Zoom has acquired Keybase, a secure messaging and file-sharing service.Missing: incorporated | Show results with:incorporated
  23. [23]
    Zoom Acquires Keybase to Build End to End Encryption
    May 7, 2020 · Zoom is acquiring Keybase, a secure messaging and file sharing service, to help it build end-to-end encryption for its video conferencing ...Missing: history | Show results with:history<|control11|><|separator|>
  24. [24]
    Zoom Buys Keybase To Shore Up Security Amid 'Zoombombing'
    May 7, 2020 · The company will help Zoom implement end-to-end encryption, a type of security which means Zoom has no access to the contents of encrypted data.Missing: motivations | Show results with:motivations
  25. [25]
    [PDF] Zoom Acquires Keybase and Announces Goal of Developing the ...
    May 7, 2020 · Zoom acquired Keybase to build end-to-end encryption with security, ease of use, and scale, and to accelerate their 90-day security plan.Missing: history | Show results with:history
  26. [26]
    Zoom Buys Keybase to Bolster Encryption in First Acquisition
    May 7, 2020 · The acquisition, Zoom's first, boosts its goal of becoming the most popular video conferencing tool with end-to-end encryption, the San Jose- ...Missing: motivations | Show results with:motivations<|separator|>
  27. [27]
    Zoom credits Keybase acquisition with quick turnaround on end-to ...
    Oct 27, 2020 · Zoom credits Keybase acquisition with quick turnaround on end-to-end encryption. A deal in May paid off for the company, which added the ...
  28. [28]
    Zoom to add end-to-end encryption with Keybase acquisition
    May 8, 2020 · Launched in 2014, Keybase lets users encrypt social media messages and shared files with public key encryption to ensure that communications ...
  29. [29]
    Zoom buys the identity service Keybase as part of 90-day security ...
    May 7, 2020 · Zoom has acquired Keybase, a startup that offers encrypted messaging and serves as a home for verifying online identities.Missing: halted | Show results with:halted<|separator|>
  30. [30]
    Keybase - Archiveteam
    Until 2023, Keybase allowed for hosting static websites under keybase.pub subdomains or custom domains through the Keybase Sites feature. This service was a ...
  31. [31]
    stellar transactions no longer supported · Issue #25982 - GitHub
    Oct 25, 2023 · Funds does not need to be sent to a new wallet, the wallet in keybase is still valid on the Stellar chain. only the keybase client no longer supports ...Missing: timeline Zcash QRL
  32. [32]
    KeyBase is DEAD · Issue #24577 - GitHub
    Keybase was probably threatened by the feds and forced to sell to Zoom due to this crypto wallet endeavor. I also doubt Zoom was even remotely interested in ...
  33. [33]
    Keybase Go Library, Client, Service, OS X, iOS, Android, Electron
    Welcome to the Keybase client repo. All our client apps (macOS, Windows, Linux, iOS, and Android) are being actively developed in this repository.
  34. [34]
    Local Key Security - Keybase Book: Chat Crypto
    There are five important steps to consider: key establishment, encrypting/decrypting, key storage on the device, password changes, and mask resets.Missing: library | Show results with:library
  35. [35]
    Learn about your Keybase account
    Proofs link your Keybase account to your other online accounts. Proofs help people trust that you are really you on Keybase. You can link your Twitter and ...
  36. [36]
    PGP in JavaScript - Keybase Book
    Generating a new key pair. Loading a key. The following examples walk through the conversion of a PGP key string (in classic armored format) to a ...
  37. [37]
    Crypto spec: the Keybase filesystem (KBFS)
    Keybase promises secrecy and integrity of file system data and metadata even in the case of total server compromise.Missing: 250GB | Show results with:250GB<|separator|>
  38. [38]
    Keybase 's Mastodon, and how to get your site on Keybase
    Apr 15, 2019 · April 15, 2019. Today we're announcing that Keybase has a new, open proof protocol, and we've kicked it off with the Mastodon Fediverse.
  39. [39]
    Chat Crypto - Keybase Book
    Each of a user's identity proofs is also signed by one of these device keys and recorded in the signature chain. (PGP keys can participate in the signature ...<|separator|>
  40. [40]
    Keybase exploding messages and forward secrecy
    Jun 20, 2018 · Forward secrecy is something extra. It protects you if someone in the future steals your device's key and also has access to old recorded ...
  41. [41]
    Keybase is not softer than TOFU
    Mar 27, 2019 · In our early days (2014 and early 2015), Keybase was a web-based PGP app, and since there were few better options, we had a feature for ...Missing: February | Show results with:February<|separator|>
  42. [42]
    [PDF] Protocol Security Review Keybase
    Feb 27, 2019 · In September 2018, NCC Group performed a review of the Keybase protocol designs and implementations. Keybase offers several features that ...Missing: 2016 | Show results with:2016
  43. [43]
    Client Architecture | Keybase Docs
    The Keybase client is a command-line application written in Go. Today it runs on macOS, Linux and Windows. The code lives in the keybase/client GitHub ...Missing: 2015 | Show results with:2015
  44. [44]
    Install Keybase
    Keybase is for keeping everyone's chats and files safe, from families to communities to companies. MacOS, Windows, Linux, iPhone, and Android.Windows · macOS · Linux
  45. [45]
    Command Line - Keybase Book
    2022 ...<|separator|>
  46. [46]
    Learn about using Keybase for Git
    Keybase supports free, encrypted, private Git repos, using a remote helper, with data encrypted and verified, and prevents overwriting conflicts.Missing: integration Merkle trees proof<|control11|><|separator|>
  47. [47]
    Server - Keybase
    Browse technical documentation on the public-key cryptography that powers Keybase. Learn how Keybase Chats, Files, Teams, and Git are secured.Missing: 2024 2025 Zoom
  48. [48]
    merkletree package - github.com/keybase/go-merkle-tree
    Jan 7, 2025 · Package merkletree is a generic Merkle Tree implementation, for provably publishing lots of data under one succinct tree root.
  49. [49]
    Hierarchical Ephemeral Keys for Exploding Messages - Keybase Book
    The advantage of the double ratchet is that it achieves forward secrecy as quickly as possible for asynchronous senders. There's no week-long window before keys ...
  50. [50]
    Learn about using Keybase for Files
    You can easily store and share files from any device you use Keybase on. Individuals can store up to 250 GB and teams can store up to 100 GB.
  51. [51]
    Introducing the Keybase Filesystem
    "Following" people adds to security. When you follow someone on Keybase, you sign a portable summary of their identity, as you saw and verified it. From then on ...Missing: social media
  52. [52]
    Keybase Book: Chat Crypto
    ### Summary of KBFS Features
  53. [53]
    Learn about using Keybase with Teams
    Use Keybase for end-to-end encrypted chat, files, and Git with teams. Collaborate with groups of people to get work done safely and securely. Learn more.Missing: limit | Show results with:limit
  54. [54]
    Teams High-Level Design - Keybase Book
    Teams High-Level Design. This document provides a high-level description of Keybase teams, specifying applications, team roles and team structure.Missing: subgroup | Show results with:subgroup
  55. [55]
    Team Box Auditor - Keybase Book
    Browse technical documentation on the public-key cryptography that powers Keybase. Learn how Keybase Chats, Files, Teams, and Git are secured.Missing: logs tools
  56. [56]
    Learn about using your Keybase Wallet
    You can use Keybase Wallet to send, receive, and exchange Stellar Lumens (XLM) and other currencies that are trusted through the Stellar network.Missing: treasuries | Show results with:treasuries
  57. [57]
    Keybase Wants To Make Serious Encryption Accessible To Mere Mortals
    ### Summary of Keybase's Approach and Impact on Encryption Adoption
  58. [58]
    Keybase moves to stop onslaught of spammers on encrypted ...
    Keybase moves to stop onslaught of spammers on encrypted message platform. Romance, drug, and blockchain scammers drawn to crypto-chat like ...Missing: airdrop | Show results with:airdrop
  59. [59]
    Keybase launches encrypted git
    Oct 4, 2017 · Starting today in the Keybase app, you'll see a new Git tab. From there, you can make hosted repositories. Just type a name and you're good to go.Missing: adoption | Show results with:adoption
  60. [60]
    Keybase and the chaos of crypto - by Vicki Boykis - Normcore Tech
    Dec 3, 2019 · Its Airdrop page now says it's up to almost 300,000 registered for this current Airdrop, making the active at least userbase 600k. That's an ...
  61. [61]
    Keybase - GitHub
    Open Source. COMMUNITY. GitHub SponsorsFund open source developers. PROGRAMS ... Go 9,119 BSD-3-Clause 1,264 4,047 199 Updated 2 days ago. managed-bots ...Missing: license | Show results with:license
  62. [62]
    Keybase Blog
    ### Earliest Blog Post Related to Keybase Launch or Founding in 2014
  63. [63]
    Keeping Each Other Safe When Virtually Organizing Mutual Aid
    Mar 30, 2020 · At EFF, we've been approached by U.S.-based ... Examples of end-to-end encrypted messaging tools include Signal, WhatsApp, and Keybase.
  64. [64]
    Docs > KBFS > The Keybase.pub site
    Keybase is for keeping everyone's chats and files safe, from families to communities to companies. MacOS, Windows, Linux, iPhone, and Android.Missing: shutdowns 2023
  65. [65]
    Keybase (@KeybaseIO) / Posts / X
    Looks for updated iOS, Android and Linux apps to be released soon. Get them via app stores (or package managers) as normal. 6. 2. 19. 6382 ·. Keybase ...<|separator|>
  66. [66]
    Terms | Keybase Docs
    Sep 12, 2023 · Keybase offers messaging, file sharing, encrypted Git, and a crypto wallet. Users retain content ownership, but must not misuse services.  ...Missing: company | Show results with:company
  67. [67]
    Keybase Docs
    2022 Keybase Book is ...Missing: desktop | Show results with:desktop
  68. [68]
    Top Keybase Alternatives in 2025 - Slashdot
    Rating 4.7 (3) Find the top alternatives to Keybase currently available. Compare ratings, reviews, pricing, and features of Keybase alternatives in 2025.
  69. [69]
    Security Updates - Keybase
    Here are Security Updates for Keybase products. Please send us feedback & bug reports. Keybase, 2025 | read our blog