[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Keybase.io



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 06/24/2014 05:15 AM, Cathal Garvey wrote:

> The problem with Keybase is that the infrastructure they're based
> upon, PGP/GPG, is probably not using modern key generation
> algorithms by default for symmetric encryption of keys. So, how
> many keys are

This should be pretty easy to test.  Anybody got a spare keybase.io
invite that they're willing to burn for a test run?

> not-entirely-trivial to crack. But keybase can't even enforce
> that, because the PGP infrastructure is too legacy-laden.

I have to agree with you on that.

- -- 
The Doctor [412/724/301/703] [ZS]
Developer, Project Byzantium: http://project-byzantium.org/

PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F  DD89 3BD8 FF2B 807B 17C1
WWW: https://drwho.virtadpt.net/

"Gentlemen, you can't fight in here! This is the War Room!" --Merkin
Muffley

-----BEGIN PGP SIGNATURE-----
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=UnFY
-----END PGP SIGNATURE-----