keybase.io

Posted on Sunday · March 05 2017 · 12:00 AM | 277 words · 2 min read

keybase.io

Today the world(well most if it!) depends on centralized+hierarchical PKI(public key infrastructure) for secured-encrypted communication.
In this system some Certification Authority(CA) issues certificates to a lot of sub-entities: the CA signs certificates to guarantee the link between an identity and the public key owned by that entity.

Pretty Good Privacy otherwise known as PGP is an encryption program. The first version of it uses what is known as the Web of Trust(WOT), where every user is a CA as opposed to PKI.

In mathematical languages, a hierarchical PKI naturally implies an acyclic certification graph, usually a tree: trust percolates down the tree from a single root CA, or a small set of root CA. Whereas the WoT is a super-connected generic graph with cycles and many paths between any two points.

Politically, the hierarchical PKI is a military-inspired structure, with a central chain of command; while the WoT is an anarchist hippy utopia in which trust emerges semi-magically from the assembled people (or the mob, from another point of view).
~ http://security.stackexchange.com/a/61366

Although WOT has advantages over PKI, it hasn’t been universally used.


💥 keybase uses your social accounts(along with other stuff) to bulletproof key exchange and thus secures your identity.

  • You first create a private-public key pair and verify your accounts.
  • Anyone can now find your public key(and verify them) from any of the sites that you have verified
  • If any of your account is compromised, you can then revoke it from keybase.

Bidirectional Graph of WOT

The graph of this model is bidirectional. It is practically impossible(well …) to compromise one’s identity, as it would require one to compromise every single node and that too without anyone noticing it.

rakeen