If you’re using Fedora Workstation, notice a Keybase icon appears in the extra status icon tray at the bottom left of your screen. For help with a specific command such as prove, type: keybase help prove Making crypto social If you want to prove more services, for example, run the keybase prove command. If you’re not running a graphical desktop, or prefer the terminal, type this to see a list of available commands: keybase help The more sites you prove, the better the level of authenticity you’re providing. To prove an additional service or site is authentically yours, select the Prove function and follow the instructions. The instructions will differ depending on the nature of the service or site. The long list of words makes the proof easy to type in, but very hard to guess. It lets you access your Keybase account from another computer in case your known computers are lost, broken, or stolen. This default proof is recorded like other devices or computers where you log in. You’ll also receive a special proof that you should write down and store in a secure location. That way the service can alert you if there’s a login from a new device. When you create a new account, you’re asked to name the computer from which you’re using the service. If you have an account on Keybase.io, you can sign in using the app window that appears. The following window appears if you’re running a graphical desktop: The following screen appears, encouraging you to use encryption. The package takes some time to download, depending on your internet connection speed. If you have a very old 32-bit system, use i386 instead of amd64 below. This example assumes you have an Intel 64-bit processor, like most computers today. To get started, download and install the package for your system. The proofs are stored in a blockchain that ensures integrity and authenticity as you make changes. Then other users can also verify your identity through these proofs. Arbitrary websites under your control are also supported. These proofs show that an account or site truly belongs to you. Proving the authenticity of a social account or site involves posting special coded information. Quite a few of these are already supported, including: Most people use some form of social network today. Like other acceptable secure systems, Keybase doesn’t rely on secret source code, and is based on free software. But it extends encryption into a social context, like Github or Gitlab do for project and source code control. It uses encryption to provide secure communications - including chat, file sharing, and publishing documents. Keybase is a service that makes a security web of trust usable for everyone.
0 Comments
Leave a Reply. |