Hubbry Logo
KeyBaseKeyBaseMain
Open search
KeyBase
Community hub
KeyBase
logo
7 pages, 0 posts
0 subscribers
Be the first to start a discussion here.
Be the first to start a discussion here.
KeyBase
KeyBase
from Wikipedia

KeyBase is a database and web application for managing and deploying interactive taxonomic keys for plants and animals developed by the Royal Botanic Gardens Victoria.[1] KeyBase provides a medium where pathway keys which were traditionally developed for print and other classical types of media, can be used more effectively in the internet environment. The platform uses a concept called "keys" which can be easily linked together, joined with other keys, or merged into larger other seamless keys groups, with each still available to be browsed independently. Keys in the KeyBase database can be filtered and displayed in a variety of ways, filters, and formats.

References

[edit]
[edit]
Revisions and contributorsEdit on WikipediaRead on Wikipedia
from Grokipedia
Keybase is an open-source, end-to-end encrypted platform for secure messaging, , and identity verification, leveraging to map users' social media accounts to cryptographic keys in a publicly auditable way. Founded in by software engineers Chris Coyne and Max Krohn, Keybase aimed to simplify the use of by allowing individuals to prove ownership of online identities—such as , , or accounts—through cryptographic proofs, thereby building trust without relying on centralized authorities. The service provides features like private team chats, self-destructing messages with timers, and the Keybase Filesystem (KBFS), a distributed, encrypted system that operates under a global namespace while ensuring only authorized users can access files. In May 2020, Keybase was acquired by Zoom Video Communications in its first-ever purchase, valued for its encryption expertise to bolster Zoom's capabilities amid growing security demands during the . As of November 2025, Keybase remains operational under Zoom, supporting cross-platform access on desktop, mobile, and via Tor, though development has slowed post-acquisition and it has faced criticism for concerns related to Zoom's ownership, complicated , and a small user base.

History

Founding and early development

Keybase was founded by Chris Coyne and Max Krohn, both of whom had previously co-founded the online dating platform and sold it to in 2011. Drawing from their experience in building user-friendly web applications, Coyne and Krohn aimed to address longstanding barriers in tools. The company was incorporated as Keybase, Inc. in New York in 2014, initially operating as a small team with limited resources and no formal at launch. The platform launched publicly in early as a free, open-source service designed to democratize . At its core, Keybase sought to simplify the discovery and verification of PGP keys by allowing users to link them to established identities, such as and accounts. This approach eliminated the need for manual key exchanges or reliance on unverified directories, making encryption more approachable for non-experts while maintaining cryptographic integrity through auditable proofs posted directly to those platforms. Keybase emerged amid heightened public awareness of following Edward Snowden's 2013 revelations, but it specifically targeted the usability hurdles that had long plagued PGP since its inception in the . Traditional PGP workflows involved cumbersome processes like attending in-person key signing parties to build a "" or manually validating fingerprints, which deterred widespread adoption. By leveraging social proofs, Keybase reduced these frictions, enabling users to verify identities with a single click while ensuring that any impersonation would require compromising multiple online accounts. Early traction came quickly, with the service gaining viral attention on shortly after launch. To support further development, Keybase secured its first major funding in July 2015: a $10.8 million led by , with participation from other investors including Stellar Development Foundation. This capital enabled the team to expand beyond the initial key directory prototype, though the focus remained on refining core identity verification tools in the platform's formative years.

Key feature launches and expansions

Following its initial launch, Keybase expanded its client offerings to enhance accessibility across devices. The desktop application was first introduced for macOS in early 2015, providing a graphical interface alongside the existing command-line tool for and macOS users. Windows support followed in mid-2016 with a native GUI client, while received improved graphical capabilities shortly thereafter, enabling broader adoption among developers and security enthusiasts. In February 2017, Keybase launched end-to-end encrypted chat, marking a significant pivot from identity verification to real-time communication. This feature supported one-on-one conversations and small group chats, integrated directly into the existing clients without requiring separate apps, and leveraged users' cryptographic identities for seamless, secure interactions. Building on this momentum, September 2017 saw the introduction of Keybase Teams, designed for organizational collaboration. Teams allowed groups to create shared encryption keys for secure channels, , and administrative controls, positioning Keybase as a privacy-focused alternative to tools like Slack. This launch emphasized cryptographic auditability, enabling teams to verify member actions and access transparently. From 2018 to 2019, Keybase integrated functionality to facilitate secure transactions within its ecosystem. Initial support for and addresses dated back to 2016, allowing users to prove ownership via identity proofs, but full wallet features expanded in 2018 with Stellar integration through a partnership with the Stellar Development Foundation. By May 2019, native Stellar wallets were rolled out across mobile and desktop clients, supporting in-chat transfers, multi-currency conversions, and low-cost transactions; identity proof support for QRL addresses was added for quantum-resistant verification. These wallets included a Stellar "spacedrop" program starting in mid-2019, distributing Lumens to verified users, but it was terminated in December 2019 due to rampant spam from fraudulent accounts exploiting the system. In , Keybase significantly expanded its Keybase Filesystem (KBFS), increasing free storage from an initial 10 GB to 250 GB per user. This update supported public, private, and team-based modes, allowing encrypted file storage and without metadata leakage, and integrated seamlessly with client apps for cross-device access. By , Keybase had a significant following, particularly within security-focused communities like developers, journalists, and enthusiasts who valued its emphasis on verifiable identities and . This expansion underscored Keybase's evolution into a comprehensive platform.

Acquisition by Zoom and subsequent decline

On May 7, 2020, Zoom Video Communications announced its acquisition of Keybase, Inc., a secure messaging and file-sharing service, for an undisclosed amount. The deal marked Zoom's first acquisition and was positioned as a key step in the company's 90-day security plan, launched earlier that year to address vulnerabilities exposed by rapid growth. The primary motivations for the acquisition stemmed from Zoom's need to strengthen amid the explosive demand for video conferencing during the , which saw daily meeting participants exceed 300 million, alongside widespread security criticisms including "" incidents. Keybase's expertise in and identity verification was seen as essential to scaling secure communications for Zoom's enterprise users, with the Keybase integrating directly into Zoom to accelerate these improvements. In the immediate aftermath, Zoom leaders and Keybase co-founder Max Krohn stated that the teams would collaborate to determine the future of the Keybase product while prioritizing Zoom's encryption enhancements, crediting the acquisition with enabling a swift rollout of end-to-end encrypted meetings by October 2020. However, development on standalone Keybase features effectively stalled, with resources redirected toward Zoom's platform; the service remained operational but received minimal updates beyond basic maintenance. Subsequent years saw a gradual decommissioning of Keybase-specific functionalities. On March 1, 2023, the keybase.pub public , which enabled static website deployment from Keybase Filesystem (KBFS) directories, was shut down, though underlying file storage via KBFS persisted for users. In October 2023, support for the integrated , including Stellar (XLM) transactions, was discontinued, prompting users to export balances to external wallets. By 2024 and into 2025, Keybase exhibited no active development, with its repositories showing negligible commit activity and no new releases since April 2023. As of mid-2025, users reported broken public key verification tools, such as issues with uploading and verifying keys since June 2025, with no fixes issued; the client also remains vulnerable to unpatched issues in underlying libraries. Community feedback highlighted persistent bugs and reliability issues, driving migrations to alternatives like Signal for messaging and IPFS for , while Zoom communications increasingly referred to Keybase as a legacy component integrated solely for cryptographic contributions. No full service shutdown has been announced, but the platform's has significantly diminished without further investment.

Core Concepts

Identity proofs and cryptography

Keybase's identity system relies on a signature chain, a tamper-evident log of cryptographic statements that records key delegations, revocations, and proofs. Users generate key pairs using the NaCl cryptographic library, featuring for encryption and Ed25519 for signing, with public keys published on keybase.io. These keys enable users to create identity proofs by signing statements that link their Keybase account to external identities, such as profiles or DNS records, which are then posted directly on those platforms. For compatibility with existing ecosystems, Keybase also supports generating or importing PGP key pairs, allowing them to participate in the signature chain for proofs and legacy use cases. Verification occurs client-side through cryptographic checks of the signatures against the published proofs, ensuring no reliance on a central authority and enabling public auditability via Merkle trees that hash proofs into a verifiable structure. Keybase supports dozens of proof types, facilitating verification across diverse platforms without requiring phone numbers or centralized trust. Examples include (via signed tweets), (via Gist signatures), (via signed posts), and addresses (via on-chain transactions), alongside DNS TXT records for domains and generic website proofs. Each proof type employs platform-specific cryptographic methods—such as API-based posting or inscriptions—to bind the external identity to the user's Keybase public key, with clients independently confirming validity by fetching and validating the signed content. This decentralized approach mitigates impersonation risks, as any alteration to a proof would invalidate the signature chain. All communications and data sharing in Keybase employ powered by the NaCl library, utilizing authenticated public-key encryption (via crypto_box) for and . is integrated for enhanced protection, particularly through ephemeral keys in exploding messages and a double-ratchet mechanism that periodically refreshes session keys, limiting exposure if a device key is compromised in the future. Key management emphasizes user control, with private keys generated and stored locally on devices, encrypted by a single user using NaCl's SecretBox; no private keys are held centrally by Keybase servers. Automatic key rotation occurs during device revocations—via per-user key (PUK) updates signed across remaining devices—and supports lazy cascading for teams, ensuring revoked keys cannot decrypt prior or future content without disrupting active sessions. The robustness of these mechanisms was validated through independent security audits. In 2019, conducted a comprehensive review of Keybase's protocols and implementations, identifying five issues, including one high-severity and three medium-severity issues (exploitable under various conditions including malicious server scenarios), all of which were promptly remediated, with the audit affirming strong protections against common attacks like key compromise and signature forgery. Earlier evaluations, including internal reviews prior to major feature launches, further confirmed the system's resistance to man-in-the-middle and replay attacks, underscoring its reliance on battle-tested primitives from NaCl.

Software architecture and open-source aspects

Keybase's software is built primarily in Go for its backend services, (CLI), and core cryptographic libraries, enabling efficient cross-platform compilation and performance-critical operations such as and proof verification. The desktop graphical user interfaces (GUIs) utilize , a framework that packages web technologies including and shared React components, allowing for consistent rendering across platforms while leveraging the underlying Go-based service for secure networking and data handling. For mobile applications on and Android, Keybase employs , facilitating code reuse between platforms and native performance through JavaScript-based rendering bridged to platform-specific components. The overall architecture follows a client-server model, where clients perform all encryption and decryption operations locally to ensure end-to-end security, while servers manage non-sensitive tasks such as proof verification against public signature chains and directory services for user discovery. This design prevents servers from accessing plaintext data or private keys, with all user content encrypted client-side before transmission. Clients communicate with servers via a duplex RPC protocol over separate processes, optimizing for reliability in network interactions like fetching roots for verification. Keybase provides cross-platform clients supporting Windows, macOS, , , and Android, alongside a dedicated CLI tool for advanced scripting and automation tasks. The CLI, implemented in Go, offers command-line access to core functionalities and is particularly useful for server environments or power users requiring precise control over operations like and proof publication. Since its launch in 2014, the entire Keybase codebase has been open-sourced on under the New BSD (3-Clause) license, promoting transparency and auditability of its security implementations. Community contributions were actively solicited and integrated through pull requests until , when development largely ceased following the acquisition by Zoom, though the repository remains publicly accessible for review and forking. Keybase integrates with to enable encrypted proofs, allowing users to host private repositories with while leveraging Git's distributed model for . For efficient proof verification, the system employs Merkle trees to structure chains and filesystem metadata, enabling clients to validate and consistency with minimal server trust through compact proofs derived from tree roots. This approach ensures tamper-evident publication of user identities and updates across the network.

User Features

Client applications

Keybase provides client applications across multiple platforms, enabling users to manage identities, communicate, and handle files securely. These applications are developed in a unified repository, supporting seamless cross-platform functionality while emphasizing ease of use for non-technical users. The desktop, mobile, and command-line interface (CLI) versions cater to different needs, from graphical interactions to scripted automation. The desktop applications are built using Electron, a framework for creating cross-platform graphical user interfaces with web technologies, and are available for Windows, macOS, and Linux. These apps facilitate key generation during initial account setup, where users create cryptographic key pairs to secure their identities. Users can also set up identity proofs by linking their Keybase account to external services like social media or websites directly through the interface. A key feature is the ability to mount the Keybase Filesystem (KBFS), allowing files to appear as local drives—such as in Finder on macOS or Explorer on Windows—for intuitive access and management. Mobile applications are developed for and Android using , providing on-the-go access to core functionalities like secure chats and . The app, available via the , enables users to manage identities, initiate encrypted conversations, and share files privately. Similarly, the Android version, distributed through , supports these features with a focus on mobile-optimized interactions. Both apps include push notifications to alert users of incoming messages, ensuring timely engagement without constant manual checking. The CLI tool, written in Go, serves as a lightweight, scriptable interface for advanced users and automation tasks. It supports key management operations, such as listing devices (keybase device list), adding new devices (keybase device add), removing revoked devices (keybase device remove), and generating backup paper keys (keybase paperkey). For file operations, it integrates with tools like kbfsfuse to mount KBFS volumes, enabling command-line access to encrypted storage. This tool is particularly useful for scripting workflows, such as encrypting files for specific users based on their verified proofs. Installation involves a one-time from the site at keybase.io/download, with platform-specific installers for desktop and mobile apps, and package managers or binaries for the CLI on distributions like or . Setup requires creating a username and linking the device via an initial key pair generation, with no mandatory verification but optional addition of identity proofs to enhance account trustworthiness by connecting to public online presences. These apps integrate with end-to-end encrypted messaging and for a cohesive . The has evolved significantly from Keybase's launch, initially emphasizing a command-line focus in for core identity and proof operations. By , with the introduction of features like chat, the applications shifted toward polished graphical user interfaces, incorporating intuitive elements such as system tray icons on desktop and touch-friendly designs on mobile to broaden . As of August 2024, the latest client release addressed compatibility issues by upgrading the version, fixing startup failures on recent and distributions.

End-to-end encrypted messaging

Keybase introduced its end-to-end encrypted chat functionality on February 8, 2017, as a core feature integrated into the desktop and mobile clients. The chat supports text messages up to 4,000 characters, attachments including images and files, and ephemeral messages that can be set to automatically delete after a specified period. Messages are encrypted using symmetric keys derived from 32 random bytes, protected via the NaCl library's crypto_secretbox with XSalsa20 and Poly1305 for authentication. Key exchange relies on for public-key encryption (via crypto_box) and Ed25519 for signing, with each device maintaining its own key pairs to ensure end-to-end security without server access to . The system supports one-on-one for private exchanges and group chats for multiple participants, with teams enabling organized channels that can accommodate up to 1,000 members at launch. These conversation types leverage shared symmetric keys distributed to all participants, allowing seamless addition or removal of members while to maintain . is enhanced through device verification, where users confirm connected devices via a public signature chain that audits key exchanges and prevents unauthorized access. Message detonation, or exploding messages, enables self-destructing content that automatically deletes after expiration (from 30 seconds to one week), with clients discarding both the message and its keys for ; in small teams of 100 or fewer members, pairwise MACs provide efficient . While servers store encrypted messages and limited metadata such as sender, recipients, message size, and channel ID, they cannot access content or full conversation details due to the client-side key management. All chats are inherently tied to users' verified identities, which are proven through cryptographic proofs linked to accounts or other public keys, ensuring participants know exactly who they are communicating with without relying on usernames alone. This integration prevents impersonation and allows messages to prior content for checks, blocking server-side tampering like reordering or deletion. Keybase chat lacks support for voice or video calls, distinguishing it from features in the acquiring company Zoom post-2020. Message history is fully preserved and syncs across devices upon . File attachments in chats are handled via the Keybase Filesystem (KBFS) for secure, encrypted storage.

File sharing and storage

The Keybase Filesystem (KBFS), launched in February 2016, is a distributed, end-to-end encrypted filesystem that enables secure file storage and sharing integrated with Keybase's identity system. It employs block-level encryption to protect data, allowing users to store up to 250 GB of files for free without a paid option. KBFS operates as a global namespace, mounting as a virtual filesystem on user devices for seamless access, and its open-source implementation ensures transparency in its cryptographic operations. Public files in KBFS are stored in the /keybase/public directory and are readable by anyone without authentication, making them suitable for sharing proofs, portfolios, or static content. These files are signed but not encrypted, with access controlled by listing writers in the top-level folder (TLF) name. Prior to its discontinuation in March 2023, public files could be hosted as static websites via the keybase.pub domain, a service that allowed subdomain or custom domain publishing; however, the files themselves remain accessible through KBFS clients, though the web hosting functionality ended. Private files provide and are accessible only to designated key holders, stored in paths like /keybase/private/username for individual users or shared folders specified in the TLF name (e.g., user1,user2). These files are mounted as local folders on the user's device—such as /Volumes/Keybase on macOS or /keybase on —enabling on-demand streaming without full synchronization unless explicitly enabled for offline access. Access is restricted to readers and writers defined in the TLF, ensuring even from Keybase servers. Team files extend private sharing to Keybase teams, stored in /keybase/team/teamname, where access is governed by team membership and uses keys derived from the team's cryptographic , including support for subgroups. These folders support versioning, allowing users to access file revisions up to two weeks prior via command-line flags like -time or -rev, and include access controls tied to team roles without relying on permissions. This enables collaborative storage with granular within organizations. Technically, KBFS encrypts files at the block level using per-block keys randomly generated for each 32 KB block, which are then derived into encryption keys and nonces via HMAC-SHA512 from the TLF's secret key—itself generated from user or team private keys. Blocks are encrypted with NaCl's SecretBox , ensuring both and , while metadata like reader/writer lists remains unencrypted for access verification. Servers store only and cannot decrypt or access , as all keys remain client-side.

Teams and Collaboration

Team creation and management

Teams in Keybase are created by an owner registering a unique, lowercase name consisting of letters, numbers, and underscores, which cannot be changed once established. The creation process involves inviting initial members via Keybase usernames, emails, phone numbers, or social handles, with invitees required to have or create a Keybase account to join. Upon formation, each team generates a unique key, derived through an XOR combination of user-encrypted key shares and server-stored key halves, ensuring that no single entity, including Keybase servers, possesses the complete decryption key. Keybase defines distinct roles to govern team access and permissions, providing granular control over operations. Owners hold full authority, including the ability to delete the root team, add or remove members, assign roles, and create subteams. Admins, appointed by owners, manage most administrative functions such as inviting or removing members, rotating keys, and creating subteams, but cannot delete the root team. Writers possess read and write access to team chats, files, and other collaborative features, while readers have read and write access to chats but are limited to read-only access to files. The following table outlines key permissions by role:
RoleAdd/Remove MembersCreate SubteamsRotate KeysDelete Root TeamChat/File Access
OwnersYesYesYesYesRead/Write
AdminsYesYesYesNoRead/Write
WritersNoNoNoNoRead/Write
ReadersNoNoNoNoRead/Write (files read-only)
Administration of teams is facilitated through client applications or command-line interfaces, allowing owners and admins to add or remove members—actions that are cryptographically signed and announced in team chat for transparency. Key rotation is a critical tool, automatically triggered or manually initiated when a member leaves, a device is revoked, or security concerns arise, updating the shared to exclude unauthorized access while re-encrypting team data. Retention policies can be configured for messages, with options to auto-delete content after intervals ranging from 30 seconds to 365 days or retain indefinitely, applied at the team or channel level. Audit capabilities are embedded via team chains, which log all administrative changes immutably, and the client-side "box " tool, which periodically verifies key assignments against membership and alerts users to discrepancies, potentially "jailing" teams until resolved. Security for teams relies on end-to-end encryption of all using team-specific keys, with private components residing solely on user devices and never stored centrally. This prevents server-side decryption, even by Keybase operators, and ensures that only authorized members can access content, as verified through cryptographic proofs in the team's signature chain. For in large organizations, Keybase supports nested subteams—private subgroups within a team—identified by pseudonyms (e.g., parentteam.subteam), allowing hierarchical structures while maintaining isolation between levels. Admins of teams act as implicit admins for subteams but require explicit addition for access, enhancing and control.

Team-specific functionalities

Keybase teams provided persistent chat channels for collaborative discussions, functioning as dedicated rooms within a team where members could engage in threaded conversations and perform searches across message history. These channels were end-to-end encrypted and accessible to all team members, enabling real-time or asynchronous communication without external intermediaries. Unlike individual chats, team channels supported structured organization, such as topic-specific rooms (e.g., #design or #hr), and integrated seamlessly with team file storage for sharing documents during discussions. Access controls in Keybase teams offered granular permissions through defined roles, including Owners (full administrative powers, such as deleting the team), Admins (managing members and subteams), Writers (read/write access to chats and files), and Readers (read/write access to chats, read-only for files). Key rotation was automated upon member removal or device revocation, updating shared keys without , as the used per-team keys derived from a secure encrypted for active members. Integrations enhanced team workflows, such as linking proofs to verify team repositories and enable encrypted Git operations within team spaces. Prior to 2023, teams could utilize wallets, particularly on the Stellar network, to manage shared treasuries for secure, collective handling of digital assets like Lumens (XLM), with protecting transactions and balances. Slack imports allowed teams to migrate existing channels, preserving conversation history in an encrypted format. Teams facilitated secure file collaboration and internal communications for companies and communities, such as coordinating sensitive projects or maintaining private discussion forums. Early adopters, including journalists from organizations like the , used teams for source protection and collaborative reporting, leveraging encrypted channels to share research securely without risking exposure. For instance, newsrooms employed subteams for investigative groups, ensuring compartmentalized access to drafts and evidence. Limitations included the absence of an external for operations after , restricting programmatic integrations to local client interfaces and hindering custom automation. Channels were limited to around 10,000 members to maintain performance, though could support larger memberships; storage was limited to 100 GB per for files and attachments. Following the acquisition by Zoom, features have seen minimal updates as of 2025.

Legacy and Current Status

Impact and user adoption

Keybase demonstrated substantial influence in making more accessible, particularly by simplifying the adoption of like PGP for non-experts. Launched in , it addressed longstanding usability barriers in PGP by allowing users to verify identities through proofs and other public anchors, enabling seamless without requiring advanced technical knowledge. This approach pioneered a user-friendly pathway to PGP integration, broadening its application beyond niche technical circles to everyday secure messaging and . The platform saw rapid user base expansion, becoming particularly popular among developers, journalists, and enthusiasts by 2020. Developers appreciated its open-source tools, such as encrypted repositories, which facilitated secure collaboration in open-source projects. Journalists adopted Keybase for protecting sources through end-to-end encrypted chats, secure in private folders, and identity verification to prevent impersonation, as recommended by organizations like the . Early communities embraced it for its integration with tools like Stellar's wallet airdrops and secure key management, fostering trust in decentralized ecosystems. Keybase's community thrived through active GitHub repositories and discussions, where users contributed to and debated features, alongside annual blog posts on keybase.io that documented updates and cryptographic advancements until 2020. This engagement highlighted its role in building a collaborative ecosystem around secure tools. The platform received recognition from privacy advocates, including the Electronic Frontier Foundation, which cited Keybase as an example of effective end-to-end encrypted messaging in guidance for mutual aid organizers and secure virtual collaboration.

Post-acquisition changes and availability

Following its acquisition by Zoom Video Communications in May 2020, Keybase has seen limited development activity, with the source code repository remaining publicly available on but primarily focused on maintenance rather than new features. As of November 2025, core client applications for macOS, Windows, , iOS, and Android are still downloadable from the official Keybase website, allowing users to install and run the software on supported platforms. End-to-end encrypted messaging and private Keybase Filesystem (KBFS) storage remain functional for existing users, enabling secure chat and , though these components receive no active enhancement beyond occasional security fixes. Public hosting services, such as the keybase.pub feature for serving static websites from public folders, were discontinued in early 2023, with files preserved in KBFS but no longer accessible via web hosting. Since the acquisition, Keybase has received only minor software updates and no major feature releases, with the latest client version (v6.5.1) released on April 28, 2025, and ongoing security patches addressing vulnerabilities as recently as November 2025. Intermittent service outages have been noted in user reports from 2023 onward, often related to server maintenance, while integration with Zoom's ecosystem is restricted to internal enterprise use cases rather than availability. Zoom's ownership ensures legal continuity under its , updated as recently as September 2023, but the platform operates as a legacy tool without dedicated investment. Users facing potential end-of-life concerns are guided by Keybase's to private keys and files using built-in commands like keybase pgp [export](/page/Export) for PGP keys and KBFS tools for , preserving access to encrypted content outside the service. discussions and reviews recommend transitioning to alternatives such as Signal for messaging or Matrix for decentralized collaboration, citing Keybase's stagnant development as a key factor. As of November 2025, Zoom has announced no plans for reviving or expanding Keybase, though sporadic security patches continue to address vulnerabilities.

References

Add your contribution
Related Hubs
User Avatar
No comments yet.