• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Keybase.io : Definitely a Great Idea From Security POV

By Abhishek Ghosh July 2, 2015 7:20 am Updated on July 2, 2015

Keybase.io : Definitely a Great Idea From Security POV

Advertisement

Keybase.io Definitely a Great Idea From Security Point of View. At least none really ever attempted a well designed website with GUI with PGP. Few weeks back, Author of this article received invitation for joining KeyBase.io. If you are wondering about what is KeyBase.io, short answer – it is a kind of hub of peoples who are usually invited and has to do with coding and has minimum idea about the word security. More than like a usual profile website, the user can sign, verify, encrypt, generate messages, sign code, move key using their server and the tools. Source code of some of the tools are available on GitHub.

We talked about GPG, may be a good point to start reading if you are fully new about privacy & security specially on the web.

 

Keybase.io : May Not Be 100% Secured But The Idea is Great

 

Basically, if we think about us – who are related to cryptography in some way or the other, we might find flaw on the security part around KeyBase. What KeyBase basically does to the mass – the public Tweet, Publicly shared status update possibly makes an ordinary person curious about what exactly these messages are.

Advertisement

---

What KeyBase believes – their website can help make using keys more secure and understandable by providing what’s known as public key infrastructure (PKI) for cryptography is not completely a marketing gimmick.

Keybase.io - Definitely a Great idea

There are few million peoples on Facebook who has no idea who is Edward Snowden or what exactly Free Software is. They possibly think the stories around data theft, Governmental spyware activities a kind of sci-fi story. Yes, we do understand the logic of the hard critics of KeyBase.io – from a cryptographic standpoint, PGP is rock solid at least for social networking purpose. KeyBase.io is a prototype project, first of its own kind; one will definitely agree – we probably have no social network which has minimum real security. Facebook’s that funky PGP key practically does nothing probably than aiding NSA to find security loopholes.

Yes, definitely we would love more to see the whole source code of their running software on server as a compact library as Free Software. But it is also true that they basically share some of their libraries and it is possible to build own CMS which is strong at security. WordPress dot ORG eventually do not share all their custom codes for many functions on the official website, taking it granted – WordPress is most commonly used website creating software.

If you need an invite to KeyBase.io, you can run a search on Twitter or ask us via Contact Us form. We will only check whether you have a real looking presence on web or not. Security eventually a divided responsibility.

Tagged With key base dot IO , what is keybase io

This Article Has Been Shared 565 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Keybase.io : Definitely a Great Idea From Security POV

  • Handy Guide to PuTTY : The SSH/Telnet Client For Windows

    Handy Guide to PuTTY provides the easy and best all in one Guide for using PuTTY including usages needed for Newer Windows Operating System with Cloud Servers.

  • Hackers : The Less Known World

    Hackers in the field of computer security is concerned with breech of security mechanisms and finding their weaknesses. Depending on motivation there are class.

  • Keyless Door Unlocking Mobile Cloud Based Apps : Gaining More Interest

    Keyless Door Unlocking Mobile Cloud Based Apps like Lockitron, ShareKey are growing interest from both the developers and the users. Let us have a deeper look.

  • Distributed Computing : Basics

    Distributed Computing is a model for solving computational problems using a large number of computers organized in clusters in a distributed infrastructure.

  • Cloud Security Solutions for Tablets and Smartphones

    Cloud Security Solutions for Tablets and Smartphones covers the issues with lost or stolen mobile devices, accidental data deletion, App security and Malwares.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Zebronics Pixaplay 16 : Entry Level Movie Projector Review February 2, 2023
  • What is Voice User Interface (VUI) January 31, 2023
  • Proxy Server: Design Pattern in Programming January 30, 2023
  • Cyberpunk Aesthetics: What’s in it Special January 27, 2023
  • How to Do Electrical Layout Plan for Adding Smart Switches January 26, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Keybase.io : Definitely a Great Idea From Security POV," in The Customize Windows, July 2, 2015, February 2, 2023, https://thecustomizewindows.com/2015/07/keybase-io-definitely-a-great-idea-from-security-pov/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT