Home > Technology peripherals > It Industry > Keybase: Sending, Receiving and Sharing Encrypted Messages

Keybase: Sending, Receiving and Sharing Encrypted Messages

Christopher Nolan
Release: 2025-02-18 10:28:09
Original
793 people have browsed it

Keybase: an open source social networking platform that simplifies encryption

Keybase is an open source encryption platform with social networking capabilities designed to simplify the encryption process and add social interaction. Users can start encryption by simply using their social media username and can link other social accounts like Reddit, GitHub, Twitter to their Keybase profile.

Keybase: Sending, Receiving and Sharing Encrypted Messages

Keybase provides a web-based client and also provides a local command line client for all major operating systems. Users can encrypt messages through the Keybase web platform, and if there is no PGP key, Keybase can generate a key for them.

Keybase is unique in that users do not need to look up the recipient's key on their personal website, email, or public key repository. Keybase provides search functionality to find the person's key in the Keybase database.

Keybase launches a new service called Keybase file system, a dedicated space where users can store and share encrypted data. Each user has 10GB of space and the file system is installed with the Keybase application.

Keybase: Sending, Receiving and Sharing Encrypted Messages Image from Keybase.io

In view of growing concerns about data security, there is growing interest in data encryption options. But encryption is not new. Looking back at history, we can find that the most famous encryption machine among them is Enigma, which was used in World War II. Earlier, we discovered the Caesar password, which Julius Caesar used to encrypt information.

Encryption is basically hiding a message in another message that usually contains meaningless words. Today, in our digital world, you can see the use of encryption in many different areas, such as in our browsers, file systems, emails, and more.

Encryption can be a bit difficult at first, especially for non-technical people. But encrypting information is a problem for everyone, not just those in technology-related fields. (For example, consider investigative journalists, data protection is crucial to them.)

In this article, I will review a tool that makes encryption easy and demonstrate how to send encrypted text messages.

Keybase Introduction

Keybase is an open source encryption platform with social networking functions. It attempts to simplify the encryption process, break down technical barriers, and add to social interaction. You just need to use your social media username to start encryption.

On Keybase, you can find people and follow them just like on Twitter. Keybase also maps your identity to your public key: You can link your other social accounts (such as Reddit, GitHub, Twitter) to your Keybase profile.

Keybase provides a web-based client and also provides a local command line client for all major operating systems.

Get and set up an account

At the time of writing, Keybase is still in the alpha phase and you need an invitation to get an account. (I have an invitation, please contact me on Twitter if you are interested.) You can also register via the form, but there is a queue so you may have to wait for a while.

Quick Tips: You may find a lot of people sending invitations on Twitter.

Keybase: Sending, Receiving and Sharing Encrypted Messages

Set your profile

After you have obtained an account on Keybase, you should create your profile. Then go to the download page. Keybase supports all three operating systems and also has source code. Follow the installation instructions for your operating system.

After you complete this, you can run Keybase:

run_keybase

Keybase: Sending, Receiving and Sharing Encrypted Messages

Great, we got a squirrel. This confirms that we are ready to use Keybase for encryption.

Verify your profile

Keybase also attempts to build this "Trust Network" platform by linking your account to your Keybase profile. Since Keybase also provides a command line application, I will use it later to verify my profile, but you can also use the web version.

Encrypt with Keybase

The key part of Keybase is encryption. You can encrypt your message through the Keybase web platform:

Keybase: Sending, Receiving and Sharing Encrypted Messages

If this is your first time encrypting the information and you do not have a PGP key, Keybase can generate a key for you.

Click to add PGP key.

To generate a key, we need to use the open source application provided by Keybase:

<code>
keybase pgp gen    # 如果您需要 PGP 密钥
keybase pgp select # 如果您已经在 GPG 中拥有一个
keybase pgp import # 从 stdin 或文件导入</code>
Copy after login
Copy after login
Copy after login

You can easily generate or import keys.

If you choose to generate a key, it will ask you for a public name and email address. After entering your information, it asks if you want to push a copy of the encryption secret key to the keybase.io server. This part is optional, but if you want to sign your messages (prove that messages are from you) or decrypt them directly from your web application, you have to add it.

First, we need to add the recipient of the encrypted message. This is a feature of Keybase. In traditional PGP encryption, you have to look for the person’s key, depending on where the person shares his key (personal website, email, public key repository, etc.) and then download the person’s key . Keybase provides a very good search option to find the person's key in the Keybase database.

Keybase: Sending, Receiving and Sharing Encrypted Messages

Let's encrypt this message: "Greetings from SitePoint".

This may take a few seconds and it will output encrypted text:

<code>
keybase pgp gen    # 如果您需要 PGP 密钥
keybase pgp select # 如果您已经在 GPG 中拥有一个
keybase pgp import # 从 stdin 或文件导入</code>
Copy after login
Copy after login
Copy after login

Keybase: Sending, Receiving and Sharing Encrypted Messages

This message can now be sent via email or any other communication platform and only the recipient can see (decrypt) it. Even if others can access our email, they cannot read or understand this message.

Decrypt using Keybase

Click the decryption button and paste your encrypted message. You will also need to enter your Keybase password. Click Decrypt.

Keybase: Sending, Receiving and Sharing Encrypted Messages

Decrypting the message may take several seconds and it will output the original text "Greetings from SitePoint".

Keybase: Sending, Receiving and Sharing Encrypted Messages

You may notice that above the secret message, there is a question mark complaining that the author of the message is unknown. This means that the authors did not sign the message with their key, so we don't know the sender. If you want to prove your identity, you should sign your key. This time, in addition to adding our message, we also need to enter our Keybase password to sign our message (this is only valid if you have added your private key to the keybase.io server).

Keybase: Sending, Receiving and Sharing Encrypted Messages

<code>-----BEGIN PGP MESSAGE-----
Version: Keybase OpenPGP v2.0.58
Comment: https://keybase.io/crypto

wcBMA8DAFbM+aWj3AQgAqhi1b5LPqWrGGKNszk2frmxrLIA7ByXXQu2CP79nnukg
YW1bHEZvkLAxE1T2vYr5T20f/tc3m3JVwLbP0nVO2oKmXjBlNfTh9o1hCLWrYZ3V
NeWMIZyP+k5nHV/oD6v3BuQJWg9ItWAXFuruMXpgXAw4j2uuD4nwJCHPiCyp6+F7
P6yhv5FAiUs63jp5Zy/LsO5wMa58ERwGSqylDzlVMwirvG2mN1VifsgnIQ8DkkyF
f/9VfdX8bnO6hNq0ilB3ZxMhJZ75VvP1CfVuQHrCPH43XTL1enico++6ikeQZ7t/
+MlJpwDrnCQ4+bNknehxD8CrZ8BQu97wgJ+oYkgyKdJQAYSKBunDIy013KgRHMz0
M2hYkqgkmzz/1rDxZSZrNfpRSuTJln3HFfhG9zoKh/hOmvv3bhJUIIKHRnxHT4n6
bDucHUHJntQGmI4zn54lepk=
=b3yA
-----END PGP MESSAGE-----</code>
Copy after login
Copy after login

It looks almost the same. Now let's decrypt this message: (Note: I've used two accounts here.)

Let's view the text that is now decrypted:

Keybase: Sending, Receiving and Sharing Encrypted Messages

Now we can see that our message has been signed by user ardianh.

Keybase Command Line Application

Now let's try the Keybase command line application. After you install the Keybase application, you can run run_keybase to verify that it is installed.

Your first step is to use keybase login to log in Keybase:

<code>-----BEGIN PGP MESSAGE-----
Version: Keybase OpenPGP v2.0.58
Comment: https://keybase.io/crypto

wcBMA8DAFbM+aWj3AQf/aW1VBnvBnxqd0KpIbU9aNcU0Ywz1RvUNaPoutYnrB6JA
CGb85UERiY4GGUFcmlJY6IfJBouBumbVh//3SzzsnnEq/Tq0F3yj0hHu2afx+fxC
lV9P1VketP+XRXCu4vY8SImdcfuIHtYEPFRHiUraNyHn0ZWeN1JfkwePYB3ntgEb
⋮
ohoRqrf7ydFf9ximOcCm4caQO8vBlf/mSj9V2fHRt+1C9o21himN2V2Xl3OvqcrZ
KP3EX/MCu+dAxXG6r3K2gCiL7MD9Ie5ziyWkUb8uDE8jeh7LWWEw9PjBlnZaIrI8
yJbpRhdB49qgvo35d7BhXu1fuZgJlY36DYLbm7nHOg==
=jIRP
-----END PGP MESSAGE-----</code>
Copy after login
Copy after login

Enter your Keybase username or email address. Then you have to configure your device. If you are already logged in from another machine and can access it, you can use that machine to configure it. Another option is to use a paper key (which you got when you first registered with keybase.io). If you can't access both, you can still use your Keybase password.

You will see something similar to the following:

<code>
1. [计算机]    macbook-pro
2. [计算机]    ubuntu-digitalocean-vps
3. [纸质密钥]    crunch lyrics
4. 我无法访问任何这些设备。</code>
Copy after login
Copy after login

Now that you are logged in, the magic is ready to begin. I will first prove (verify) my Twitter account.

<code>
keybase pgp gen    # 如果您需要 PGP 密钥
keybase pgp select # 如果您已经在 GPG 中拥有一个
keybase pgp import # 从 stdin 或文件导入</code>
Copy after login
Copy after login
Copy after login

This will require you to post a specific tweet related to your Keybase username. This process does not require any oAuth authorization from Twitter, which is great. You will receive an email from Keybase telling you that the proof of identity has been successful. If you visit my profile, you will see that my Twitter profile has been added and you can even view tweets. The process of linking other social accounts to your Keybase account is roughly the same, and Keybase provides instructions for each account.

You don't have to visit Keybase's website to encrypt your messages either. It can be done directly from the command line application.

<code>-----BEGIN PGP MESSAGE-----
Version: Keybase OpenPGP v2.0.58
Comment: https://keybase.io/crypto

wcBMA8DAFbM+aWj3AQgAqhi1b5LPqWrGGKNszk2frmxrLIA7ByXXQu2CP79nnukg
YW1bHEZvkLAxE1T2vYr5T20f/tc3m3JVwLbP0nVO2oKmXjBlNfTh9o1hCLWrYZ3V
NeWMIZyP+k5nHV/oD6v3BuQJWg9ItWAXFuruMXpgXAw4j2uuD4nwJCHPiCyp6+F7
P6yhv5FAiUs63jp5Zy/LsO5wMa58ERwGSqylDzlVMwirvG2mN1VifsgnIQ8DkkyF
f/9VfdX8bnO6hNq0ilB3ZxMhJZ75VvP1CfVuQHrCPH43XTL1enico++6ikeQZ7t/
+MlJpwDrnCQ4+bNknehxD8CrZ8BQu97wgJ+oYkgyKdJQAYSKBunDIy013KgRHMz0
M2hYkqgkmzz/1rDxZSZrNfpRSuTJln3HFfhG9zoKh/hOmvv3bhJUIIKHRnxHT4n6
bDucHUHJntQGmI4zn54lepk=
=b3yA
-----END PGP MESSAGE-----</code>
Copy after login
Copy after login

If you don't follow the person you're sending a message to, it will give you information about the username so that you won't select the wrong person:

<code>-----BEGIN PGP MESSAGE-----
Version: Keybase OpenPGP v2.0.58
Comment: https://keybase.io/crypto

wcBMA8DAFbM+aWj3AQf/aW1VBnvBnxqd0KpIbU9aNcU0Ywz1RvUNaPoutYnrB6JA
CGb85UERiY4GGUFcmlJY6IfJBouBumbVh//3SzzsnnEq/Tq0F3yj0hHu2afx+fxC
lV9P1VketP+XRXCu4vY8SImdcfuIHtYEPFRHiUraNyHn0ZWeN1JfkwePYB3ntgEb
⋮
ohoRqrf7ydFf9ximOcCm4caQO8vBlf/mSj9V2fHRt+1C9o21himN2V2Xl3OvqcrZ
KP3EX/MCu+dAxXG6r3K2gCiL7MD9Ie5ziyWkUb8uDE8jeh7LWWEw9PjBlnZaIrI8
yJbpRhdB49qgvo35d7BhXu1fuZgJlY36DYLbm7nHOg==
=jIRP
-----END PGP MESSAGE-----</code>
Copy after login
Copy after login
<code>
1. [计算机]    macbook-pro
2. [计算机]    ubuntu-digitalocean-vps
3. [纸质密钥]    crunch lyrics
4. 我无法访问任何这些设备。</code>
Copy after login
Copy after login

Keybase will now output an encrypted message. Similarly, decryption can be done from the command line.

<code>
输入此设备的公开名称:digitalocea-vps
✔ 成功!您已配置您的设备 digitalocea-vps。</code>
Copy after login

Greetings from SitePoint

The command line application has more features. Use keybase help to get a list of all available options.

Conclusion

Keybase has transformed encryption into an easy-to-use and friendly option for beginners.

The Keybase team recently launched a new service called Keybase File System, a dedicated space where you can store and share encrypted data. Each user has 10GB of space and the file system is installed with the Keybase application.

So, what do you think? Is this a tool you will use? Have you tried it? If so, what do you think? Please feel free to discuss or ask any questions below.

Keybase FAQ (FAQ)

How to make sure my Keybase message is encrypted?

Keybase automatically encrypts all messages sent through its platform. This means that only the intended recipients with the corresponding private key can decrypt and read messages. The encryption process is seamless and does not require any additional steps for the user. However, be sure to protect your private key to prevent unauthorized access to your messages.

What if I lose the Keybase private key?

If you lose your private key, unfortunately, you cannot recover it. This is a security feature designed to protect your messages. If you lose your private key, you need to create a new Keybase account and generate a new key pair. Remember to store your private key in a secure location to prevent loss.

Can I use Keybase to send encrypted files?

Yes, Keybase supports sending encrypted files. Like messages, files sent through Keybase are automatically encrypted. The recipient can then decrypt the file using its private key. This feature makes Keybase an excellent tool for securely sharing sensitive documents.

How to decrypt messages or files received through Keybase?

To decrypt messages or files, you need your private key. Keybase automatically decrypts messages and files when you open them. If you cannot decrypt messages or files, make sure you are using the correct private key.

Can I use Keybase on multiple devices?

Yes, Keybase supports multiple devices. You can install the Keybase app on your computer, smartphone, or tablet and access your account from any of these devices. However, remember that each device requires a copy of your private key to decrypt messages and files.

Is Keybase safe?

Keybase uses end-to-end encryption, which is one of the most secure encryption methods available at present. This means that only senders and recipients can read messages—even Keybase cannot access them. However, your message security also depends on how well you protect your private key.

Can I use Keybase for group chat?

Yes, Keybase supports group chat. You can create a team on Keybase and invite other users to join. All messages sent in team chats are encrypted to ensure secure communication within the group.

How to verify the identity of a user on Keybase?

Keybase provides several ways to verify user identity. Users can link their Keybase account to their social media profiles, such as Twitter or GitHub. You can check these links to verify the user's identity.

What if I forget the Keybase password?

If you forget your Keybase password, you can reset it using your email address. However, if you also cannot access your email account, you will need to create a new Keybase account.

Can I use Keybase without installing the application?

Yes, Keybase provides a web version that you can use without installing an application. However, for the best experience and full functionality, the Keybase application is recommended.

The above is the detailed content of Keybase: Sending, Receiving and Sharing Encrypted Messages. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Latest Articles by Author
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template