-
-
Notifications
You must be signed in to change notification settings - Fork 385
🆕 Software Suggestion | Keybase #740
Comments
So Adding keybase to?
|
Site doesn't have CSP policy, track referer, use Amazon AWS server (from USA) See https://webbkoll.dataskydd.net/en/results?url=http%3A%2F%2Fkeybase.io |
You don't have to go to the website to use Keybase.
DuckDuckGo uses AWS, Signal uses AWS, GitHub uses AWS – all recommended by privacytools.io … So there are more recommendations on privacytools.io that don't match your criteria. |
@infosec-handbook maybe nobody see this problem with Amazon yet? |
This criticism of keybase is 1 year old, so I'm not sure how much of it still applies: Keybase, we have a problem.The Keybase software and service are both littered with severe bugs that create a security and legal nightmare. Here are some of the issues:
|
This is what most of people I know using it use it for, but I have recently became aware of Indieweb and it's rel=me that do account linkability (at least with Mastodon it works both ways) and proof of identity, even if not cryptographically. I don't know how it could be proposed instead on Privacytools.io. |
@beerisgood and @libBletchley Thanks for the feedback I'll look into this because I wasn't aware honestly. |
@infosec-handbook
Those are all problematic services that should be removed from privacytools.io or heavily cautioned - not just for using AWS.
Also, Amazon is a privacy abuser:
Apart from AWS being untrustworthy, it's detrimental to privacy to promote anything that feeds Amazon financially. |
@libBletchley I just looked at your "significant list of privacy problems" in Signal. I can't agree since one can install Signal using the official apk provided at https://signal.org/android/apk/. Furthermore, you don't need Google on your phone. The rest are mostly technical issues with Debian (if true). Moreover, I don't get why you use GitHub (hosted by AWS) for more than 3 years if your privacy gets abused by doing so? |
@infosec-handbook
There are half a dozen problems with that. I've just introduced https://github.com/privacytoolsIO/privacytools.io/issues/779. Scroll down to item "3" on that page.
I think you mean to say users don't need Google's Playstore app on their phone. While that's true, the third-party apps do not obviate any of the privacy abuses I've enumerated. In particular, users still need a Google account to access the apps and that's what mushrooms into many abuses both with obtaining the account and also with using it. And again, the small minority of users who manage to circumvent the Playstore app are not the target audience of privacytools.io.
You missed the CloudFlare discussion. Signal subjects users looking for support information to CloudFlare. Centralization on AWS is also a problem.
I registered on Github before MS was the owner and only just learned yesterday from your Jan. 26 post that AWS was involved. Privacytools.io needs to move away from Github and until they do it's indeed a conflict of interest. Prism-break project made the good decision to leave github.com only to then make the poor decision to use gitlab.com. There are better options than both of them but this isn't the thread for that chat. The first step needed is to get privacytoolsio off github and get it endorsing something consistent with its values. The next step to pimp privacytoolsio updated endorsement to other projects. |
I cannot find this with CTRL+F here https://palant.de/2018/09/06/keybase-our-browser-extension-subverts-our-encryption-but-why-should-we-care |
@libBletchley what platform do you suggest privacytoolsio move to, out of curiosity? |
Keybase.io privacy issue: the MX servers for
I suggest Notabug.org. Just opened #843 for this discussion. |
Keybase has found its way to my i3 config and is one of the three chat apps I support enough to autostart (after deleting Facebook Messenger and Facebook WhatsApp, I like how it stays in the tray and there are nice people in their teams, so I guess I should raise this thread and try to comment (even if it's a bit weird with the other party being a 👻, but I hope others may have insight).
Doesn't this mean that the actual Keybase.io server needs to be trusted less?
I haven't read their privacy policy recently, but I think this is implied in their Tor mode documentation which says that it's not supported by Keybase GUI and to enable Tor mode you set it either as leaky or strict (which is currently said to be broken). https://keybase.io/docs/command_line/tor
What are these some of the more embarrassing security-critical bug reports?
IPFS is also doing this, however with it this is opt-in.
I should check this as this is not legal under GDPR.
I should check this too, I would also say that in practice you need the app to do anything, especially if you wish to use their version of 2FA, https://keybase.io/docs/lockdown/index |
I should add that I have since learned that the Keybase server isn't open source (only the client is), while I was previously in impression it was open. keybase/client#6374 |
Basic Information
Name: Keybase
Category: e2eE chat, e2eE storage with kbfs, e2eE private git repo, cryptographic account linkability and proof of identity
URL: https://keybase.io/
Description
Imho Keybase should be added. It's early days for a lot of it's features but still already nice filestorage with better guarantees than the competitors. E2E chat and
The text was updated successfully, but these errors were encountered: