[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


On Fri, Jun 20, 2014 at 12:09 PM, Cathal Garvey <
[email protected]> wrote:

> I wouldn't say "true", I'd say "proto". In the end, you're still relying
> on a central point of trust, in this case Keybase, for a lot of the key
> distribution, but as a way to bootstrap a WoT that can outgrow Keybase I
> think it looks really promising. I'm not one to shirk hackish solutions
> in favour of purity, because purity has barely worked in decades of PGP
> WoT building.
> Speaking of Keybase, anyone got an invite? :)

I've been very impressed with how Keybase has evolved, and how well they
explain their model to users. It is without a doubt what I'd recommend to a
semi- or un-technical user to get them started.

They have a walkthrough of their approach to security and threat models

And they explain "tracking" in detail here: https://keybase.io/docs/tracking

> On 20/06/14 17:03, MrBiTs wrote:
> > Hello, guys
> >
> >
> > Keybase.io seems to be a great tool to create a true WoT. Are anybody in
> there? They are working with invitations.
> >
> > CheerS
> >
> >
> --
> T: @onetruecathal, @IndieBBDNA
> P: +353876363185
> W: http://indiebiotech.com

konklone.com | @konklone <https://twitter.com/konklone>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20140623/63f090a3/attachment.html>