search
HomeTechnology peripheralsIt IndustryKeybase: Sending, Receiving and Sharing Encrypted Messages

Keybase: an open source social networking platform that simplifies encryption

Keybase is an open source encryption platform with social networking capabilities designed to simplify the encryption process and add social interaction. Users can start encryption by simply using their social media username and can link other social accounts like Reddit, GitHub, Twitter to their Keybase profile.

Keybase: Sending, Receiving and Sharing Encrypted Messages

Keybase provides a web-based client and also provides a local command line client for all major operating systems. Users can encrypt messages through the Keybase web platform, and if there is no PGP key, Keybase can generate a key for them.

Keybase is unique in that users do not need to look up the recipient's key on their personal website, email, or public key repository. Keybase provides search functionality to find the person's key in the Keybase database.

Keybase launches a new service called Keybase file system, a dedicated space where users can store and share encrypted data. Each user has 10GB of space and the file system is installed with the Keybase application.

Keybase: Sending, Receiving and Sharing Encrypted Messages Image from Keybase.io

In view of growing concerns about data security, there is growing interest in data encryption options. But encryption is not new. Looking back at history, we can find that the most famous encryption machine among them is Enigma, which was used in World War II. Earlier, we discovered the Caesar password, which Julius Caesar used to encrypt information.

Encryption is basically hiding a message in another message that usually contains meaningless words. Today, in our digital world, you can see the use of encryption in many different areas, such as in our browsers, file systems, emails, and more.

Encryption can be a bit difficult at first, especially for non-technical people. But encrypting information is a problem for everyone, not just those in technology-related fields. (For example, consider investigative journalists, data protection is crucial to them.)

In this article, I will review a tool that makes encryption easy and demonstrate how to send encrypted text messages.

Keybase Introduction

Keybase is an open source encryption platform with social networking functions. It attempts to simplify the encryption process, break down technical barriers, and add to social interaction. You just need to use your social media username to start encryption.

On Keybase, you can find people and follow them just like on Twitter. Keybase also maps your identity to your public key: You can link your other social accounts (such as Reddit, GitHub, Twitter) to your Keybase profile.

Keybase provides a web-based client and also provides a local command line client for all major operating systems.

Get and set up an account

At the time of writing, Keybase is still in the alpha phase and you need an invitation to get an account. (I have an invitation, please contact me on Twitter if you are interested.) You can also register via the form, but there is a queue so you may have to wait for a while.

Quick Tips: You may find a lot of people sending invitations on Twitter.

Keybase: Sending, Receiving and Sharing Encrypted Messages

Set your profile

After you have obtained an account on Keybase, you should create your profile. Then go to the download page. Keybase supports all three operating systems and also has source code. Follow the installation instructions for your operating system.

After you complete this, you can run Keybase:

run_keybase

Keybase: Sending, Receiving and Sharing Encrypted Messages

Great, we got a squirrel. This confirms that we are ready to use Keybase for encryption.

Verify your profile

Keybase also attempts to build this "Trust Network" platform by linking your account to your Keybase profile. Since Keybase also provides a command line application, I will use it later to verify my profile, but you can also use the web version.

Encrypt with Keybase

The key part of Keybase is encryption. You can encrypt your message through the Keybase web platform:

Keybase: Sending, Receiving and Sharing Encrypted Messages

If this is your first time encrypting the information and you do not have a PGP key, Keybase can generate a key for you.

Click to add PGP key.

To generate a key, we need to use the open source application provided by Keybase:

<code>
keybase pgp gen    # 如果您需要 PGP 密钥
keybase pgp select # 如果您已经在 GPG 中拥有一个
keybase pgp import # 从 stdin 或文件导入</code>

You can easily generate or import keys.

If you choose to generate a key, it will ask you for a public name and email address. After entering your information, it asks if you want to push a copy of the encryption secret key to the keybase.io server. This part is optional, but if you want to sign your messages (prove that messages are from you) or decrypt them directly from your web application, you have to add it.

First, we need to add the recipient of the encrypted message. This is a feature of Keybase. In traditional PGP encryption, you have to look for the person’s key, depending on where the person shares his key (personal website, email, public key repository, etc.) and then download the person’s key . Keybase provides a very good search option to find the person's key in the Keybase database.

Keybase: Sending, Receiving and Sharing Encrypted Messages

Let's encrypt this message: "Greetings from SitePoint".

This may take a few seconds and it will output encrypted text:

<code>
keybase pgp gen    # 如果您需要 PGP 密钥
keybase pgp select # 如果您已经在 GPG 中拥有一个
keybase pgp import # 从 stdin 或文件导入</code>

Keybase: Sending, Receiving and Sharing Encrypted Messages

This message can now be sent via email or any other communication platform and only the recipient can see (decrypt) it. Even if others can access our email, they cannot read or understand this message.

Decrypt using Keybase

Click the decryption button and paste your encrypted message. You will also need to enter your Keybase password. Click Decrypt.

Keybase: Sending, Receiving and Sharing Encrypted Messages

Decrypting the message may take several seconds and it will output the original text "Greetings from SitePoint".

Keybase: Sending, Receiving and Sharing Encrypted Messages

You may notice that above the secret message, there is a question mark complaining that the author of the message is unknown. This means that the authors did not sign the message with their key, so we don't know the sender. If you want to prove your identity, you should sign your key. This time, in addition to adding our message, we also need to enter our Keybase password to sign our message (this is only valid if you have added your private key to the keybase.io server).

Keybase: Sending, Receiving and Sharing Encrypted Messages

<code>-----BEGIN PGP MESSAGE-----
Version: Keybase OpenPGP v2.0.58
Comment: https://keybase.io/crypto

wcBMA8DAFbM+aWj3AQgAqhi1b5LPqWrGGKNszk2frmxrLIA7ByXXQu2CP79nnukg
YW1bHEZvkLAxE1T2vYr5T20f/tc3m3JVwLbP0nVO2oKmXjBlNfTh9o1hCLWrYZ3V
NeWMIZyP+k5nHV/oD6v3BuQJWg9ItWAXFuruMXpgXAw4j2uuD4nwJCHPiCyp6+F7
P6yhv5FAiUs63jp5Zy/LsO5wMa58ERwGSqylDzlVMwirvG2mN1VifsgnIQ8DkkyF
f/9VfdX8bnO6hNq0ilB3ZxMhJZ75VvP1CfVuQHrCPH43XTL1enico++6ikeQZ7t/
+MlJpwDrnCQ4+bNknehxD8CrZ8BQu97wgJ+oYkgyKdJQAYSKBunDIy013KgRHMz0
M2hYkqgkmzz/1rDxZSZrNfpRSuTJln3HFfhG9zoKh/hOmvv3bhJUIIKHRnxHT4n6
bDucHUHJntQGmI4zn54lepk=
=b3yA
-----END PGP MESSAGE-----</code>

It looks almost the same. Now let's decrypt this message: (Note: I've used two accounts here.)

Let's view the text that is now decrypted:

Keybase: Sending, Receiving and Sharing Encrypted Messages

Now we can see that our message has been signed by user ardianh.

Keybase Command Line Application

Now let's try the Keybase command line application. After you install the Keybase application, you can run run_keybase to verify that it is installed.

Your first step is to use keybase login to log in Keybase:

<code>-----BEGIN PGP MESSAGE-----
Version: Keybase OpenPGP v2.0.58
Comment: https://keybase.io/crypto

wcBMA8DAFbM+aWj3AQf/aW1VBnvBnxqd0KpIbU9aNcU0Ywz1RvUNaPoutYnrB6JA
CGb85UERiY4GGUFcmlJY6IfJBouBumbVh//3SzzsnnEq/Tq0F3yj0hHu2afx+fxC
lV9P1VketP+XRXCu4vY8SImdcfuIHtYEPFRHiUraNyHn0ZWeN1JfkwePYB3ntgEb
⋮
ohoRqrf7ydFf9ximOcCm4caQO8vBlf/mSj9V2fHRt+1C9o21himN2V2Xl3OvqcrZ
KP3EX/MCu+dAxXG6r3K2gCiL7MD9Ie5ziyWkUb8uDE8jeh7LWWEw9PjBlnZaIrI8
yJbpRhdB49qgvo35d7BhXu1fuZgJlY36DYLbm7nHOg==
=jIRP
-----END PGP MESSAGE-----</code>

Enter your Keybase username or email address. Then you have to configure your device. If you are already logged in from another machine and can access it, you can use that machine to configure it. Another option is to use a paper key (which you got when you first registered with keybase.io). If you can't access both, you can still use your Keybase password.

You will see something similar to the following:

<code>
1. [计算机]    macbook-pro
2. [计算机]    ubuntu-digitalocean-vps
3. [纸质密钥]    crunch lyrics
4. 我无法访问任何这些设备。</code>

Now that you are logged in, the magic is ready to begin. I will first prove (verify) my Twitter account.

<code>
keybase pgp gen    # 如果您需要 PGP 密钥
keybase pgp select # 如果您已经在 GPG 中拥有一个
keybase pgp import # 从 stdin 或文件导入</code>

This will require you to post a specific tweet related to your Keybase username. This process does not require any oAuth authorization from Twitter, which is great. You will receive an email from Keybase telling you that the proof of identity has been successful. If you visit my profile, you will see that my Twitter profile has been added and you can even view tweets. The process of linking other social accounts to your Keybase account is roughly the same, and Keybase provides instructions for each account.

You don't have to visit Keybase's website to encrypt your messages either. It can be done directly from the command line application.

<code>-----BEGIN PGP MESSAGE-----
Version: Keybase OpenPGP v2.0.58
Comment: https://keybase.io/crypto

wcBMA8DAFbM+aWj3AQgAqhi1b5LPqWrGGKNszk2frmxrLIA7ByXXQu2CP79nnukg
YW1bHEZvkLAxE1T2vYr5T20f/tc3m3JVwLbP0nVO2oKmXjBlNfTh9o1hCLWrYZ3V
NeWMIZyP+k5nHV/oD6v3BuQJWg9ItWAXFuruMXpgXAw4j2uuD4nwJCHPiCyp6+F7
P6yhv5FAiUs63jp5Zy/LsO5wMa58ERwGSqylDzlVMwirvG2mN1VifsgnIQ8DkkyF
f/9VfdX8bnO6hNq0ilB3ZxMhJZ75VvP1CfVuQHrCPH43XTL1enico++6ikeQZ7t/
+MlJpwDrnCQ4+bNknehxD8CrZ8BQu97wgJ+oYkgyKdJQAYSKBunDIy013KgRHMz0
M2hYkqgkmzz/1rDxZSZrNfpRSuTJln3HFfhG9zoKh/hOmvv3bhJUIIKHRnxHT4n6
bDucHUHJntQGmI4zn54lepk=
=b3yA
-----END PGP MESSAGE-----</code>

If you don't follow the person you're sending a message to, it will give you information about the username so that you won't select the wrong person:

<code>-----BEGIN PGP MESSAGE-----
Version: Keybase OpenPGP v2.0.58
Comment: https://keybase.io/crypto

wcBMA8DAFbM+aWj3AQf/aW1VBnvBnxqd0KpIbU9aNcU0Ywz1RvUNaPoutYnrB6JA
CGb85UERiY4GGUFcmlJY6IfJBouBumbVh//3SzzsnnEq/Tq0F3yj0hHu2afx+fxC
lV9P1VketP+XRXCu4vY8SImdcfuIHtYEPFRHiUraNyHn0ZWeN1JfkwePYB3ntgEb
⋮
ohoRqrf7ydFf9ximOcCm4caQO8vBlf/mSj9V2fHRt+1C9o21himN2V2Xl3OvqcrZ
KP3EX/MCu+dAxXG6r3K2gCiL7MD9Ie5ziyWkUb8uDE8jeh7LWWEw9PjBlnZaIrI8
yJbpRhdB49qgvo35d7BhXu1fuZgJlY36DYLbm7nHOg==
=jIRP
-----END PGP MESSAGE-----</code>
<code>
1. [计算机]    macbook-pro
2. [计算机]    ubuntu-digitalocean-vps
3. [纸质密钥]    crunch lyrics
4. 我无法访问任何这些设备。</code>

Keybase will now output an encrypted message. Similarly, decryption can be done from the command line.

<code>
输入此设备的公开名称:digitalocea-vps
✔ 成功!您已配置您的设备 digitalocea-vps。</code>

Greetings from SitePoint

The command line application has more features. Use keybase help to get a list of all available options.

Conclusion

Keybase has transformed encryption into an easy-to-use and friendly option for beginners.

The Keybase team recently launched a new service called Keybase File System, a dedicated space where you can store and share encrypted data. Each user has 10GB of space and the file system is installed with the Keybase application.

So, what do you think? Is this a tool you will use? Have you tried it? If so, what do you think? Please feel free to discuss or ask any questions below.

Keybase FAQ (FAQ)

How to make sure my Keybase message is encrypted?

Keybase automatically encrypts all messages sent through its platform. This means that only the intended recipients with the corresponding private key can decrypt and read messages. The encryption process is seamless and does not require any additional steps for the user. However, be sure to protect your private key to prevent unauthorized access to your messages.

What if I lose the Keybase private key?

If you lose your private key, unfortunately, you cannot recover it. This is a security feature designed to protect your messages. If you lose your private key, you need to create a new Keybase account and generate a new key pair. Remember to store your private key in a secure location to prevent loss.

Can I use Keybase to send encrypted files?

Yes, Keybase supports sending encrypted files. Like messages, files sent through Keybase are automatically encrypted. The recipient can then decrypt the file using its private key. This feature makes Keybase an excellent tool for securely sharing sensitive documents.

How to decrypt messages or files received through Keybase?

To decrypt messages or files, you need your private key. Keybase automatically decrypts messages and files when you open them. If you cannot decrypt messages or files, make sure you are using the correct private key.

Can I use Keybase on multiple devices?

Yes, Keybase supports multiple devices. You can install the Keybase app on your computer, smartphone, or tablet and access your account from any of these devices. However, remember that each device requires a copy of your private key to decrypt messages and files.

Is Keybase safe?

Keybase uses end-to-end encryption, which is one of the most secure encryption methods available at present. This means that only senders and recipients can read messages—even Keybase cannot access them. However, your message security also depends on how well you protect your private key.

Can I use Keybase for group chat?

Yes, Keybase supports group chat. You can create a team on Keybase and invite other users to join. All messages sent in team chats are encrypted to ensure secure communication within the group.

How to verify the identity of a user on Keybase?

Keybase provides several ways to verify user identity. Users can link their Keybase account to their social media profiles, such as Twitter or GitHub. You can check these links to verify the user's identity.

What if I forget the Keybase password?

If you forget your Keybase password, you can reset it using your email address. However, if you also cannot access your email account, you will need to create a new Keybase account.

Can I use Keybase without installing the application?

Yes, Keybase provides a web version that you can use without installing an application. However, for the best experience and full functionality, the Keybase application is recommended.

The above is the detailed content of Keybase: Sending, Receiving and Sharing Encrypted Messages. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Building a Network Vulnerability Scanner with GoBuilding a Network Vulnerability Scanner with GoApr 01, 2025 am 08:27 AM

This Go-based network vulnerability scanner efficiently identifies potential security weaknesses. It leverages Go's concurrency features for speed and includes service detection and vulnerability matching. Let's explore its capabilities and ethical

Top 10 Best Free Backlink Checker Tools in 2025Top 10 Best Free Backlink Checker Tools in 2025Mar 21, 2025 am 08:28 AM

Website construction is just the first step: the importance of SEO and backlinks Building a website is just the first step to converting it into a valuable marketing asset. You need to do SEO optimization to improve the visibility of your website in search engines and attract potential customers. Backlinks are the key to improving your website rankings, and it shows Google and other search engines the authority and credibility of your website. Not all backlinks are beneficial: Identify and avoid harmful links Not all backlinks are beneficial. Harmful links can harm your ranking. Excellent free backlink checking tool monitors the source of links to your website and reminds you of harmful links. In addition, you can also analyze your competitors’ link strategies and learn from them. Free backlink checking tool: Your SEO intelligence officer

Another national product from Baidu is connected to DeepSeek. Is it open or follow the trend?Another national product from Baidu is connected to DeepSeek. Is it open or follow the trend?Mar 12, 2025 pm 01:48 PM

DeepSeek-R1 empowers Baidu Library and Netdisk: The perfect integration of deep thinking and action has quickly integrated into many platforms in just one month. With its bold strategic layout, Baidu integrates DeepSeek as a third-party model partner and integrates it into its ecosystem, which marks a major progress in its "big model search" ecological strategy. Baidu Search and Wenxin Intelligent Intelligent Platform are the first to connect to the deep search functions of DeepSeek and Wenxin big models, providing users with a free AI search experience. At the same time, the classic slogan of "You will know when you go to Baidu", and the new version of Baidu APP also integrates the capabilities of Wenxin's big model and DeepSeek, launching "AI search" and "wide network information refinement"

Behind the first Android access to DeepSeek: Seeing the power of womenBehind the first Android access to DeepSeek: Seeing the power of womenMar 12, 2025 pm 12:27 PM

The rise of Chinese women's tech power in the field of AI: The story behind Honor's collaboration with DeepSeek women's contribution to the field of technology is becoming increasingly significant. Data from the Ministry of Science and Technology of China shows that the number of female science and technology workers is huge and shows unique social value sensitivity in the development of AI algorithms. This article will focus on Honor mobile phones and explore the strength of the female team behind it being the first to connect to the DeepSeek big model, showing how they can promote technological progress and reshape the value coordinate system of technological development. On February 8, 2024, Honor officially launched the DeepSeek-R1 full-blood version big model, becoming the first manufacturer in the Android camp to connect to DeepSeek, arousing enthusiastic response from users. Behind this success, female team members are making product decisions, technical breakthroughs and users

DeepSeek's 'amazing' profit: the theoretical profit margin is as high as 545%!DeepSeek's 'amazing' profit: the theoretical profit margin is as high as 545%!Mar 12, 2025 pm 12:21 PM

DeepSeek released a technical article on Zhihu, introducing its DeepSeek-V3/R1 inference system in detail, and disclosed key financial data for the first time, which attracted industry attention. The article shows that the system's daily cost profit margin is as high as 545%, setting a new high in global AI big model profit. DeepSeek's low-cost strategy gives it an advantage in market competition. The cost of its model training is only 1%-5% of similar products, and the cost of V3 model training is only US$5.576 million, far lower than that of its competitors. Meanwhile, R1's API pricing is only 1/7 to 1/2 of OpenAIo3-mini. These data prove the commercial feasibility of the DeepSeek technology route and also establish the efficient profitability of AI models.

Midea launches its first DeepSeek air conditioner: AI voice interaction can achieve 400,000 commands!Midea launches its first DeepSeek air conditioner: AI voice interaction can achieve 400,000 commands!Mar 12, 2025 pm 12:18 PM

Midea will soon release its first air conditioner equipped with a DeepSeek big model - Midea fresh and clean air machine T6. The press conference is scheduled to be held at 1:30 pm on March 1. This air conditioner is equipped with an advanced air intelligent driving system, which can intelligently adjust parameters such as temperature, humidity and wind speed according to the environment. More importantly, it integrates the DeepSeek big model and supports more than 400,000 AI voice commands. Midea's move has caused heated discussions in the industry, and is particularly concerned about the significance of combining white goods and large models. Unlike the simple temperature settings of traditional air conditioners, Midea fresh and clean air machine T6 can understand more complex and vague instructions and intelligently adjust humidity according to the home environment, significantly improving the user experience.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Atom editor mac version download

Atom editor mac version download

The most popular open source editor