Ask HN: Keybase Alternatives?
726 points| capableweb | 5 years ago
I myself mostly use the following features from Keybase: Chat, KBFS, Git repositories and encrypting messages sent out-of-band via PGP in Keybase (and the various cryptographic tools [signing, validation etc])
What alternatives have the features outlined above, but are ideally either FOSS or at least not run by a for-profit company? I mainly used Keybase to make using those features easier, so please don't suggest the cli of gnupgp (or similar) as alternatives.
[+] [-] lucideer|5 years ago|reply
While all these features are individually nice, I kinda started to worry about Keybase as a product when they started bolting on stuff like this.
I think the key (pun intended) to stable & ongoing success in this space is to focus on doing one thing well. Keybase was incepted as a service for signing & validation. There's currently https://keys.pub for that. I'd be interested to hear if there's others.
For chat, there's a lot of competitors to choose from. I like Riot.im.
For KBFS, Tresorit has been mentioned. I signed up, but haven't been super impressed with their clients yet. I'm not sure what better options are out there.
[+] [-] SkyMarshal|5 years ago|reply
https://github.com/keybase
The only other alternative is a mishmash of multiple apps that each do part of what Keybase does.
[+] [-] jamieweb|5 years ago|reply
As far as I know, that was Keybase's initial offering, which they then built on top of to create a full suite of applications.
Although to play the Devil's advocate - while the feature is cool and implemented nicely, I doubt that many people actually use it beyond the novelty factor.
[+] [-] samatman|5 years ago|reply
That leadededededed to paying work, so it was important even if it only happened one time.
[+] [-] sylvain_kerkour|5 years ago|reply
If you are interested in joining the (coming soon) beta, feel free to contact me: https://bloom.sh/contact
[0] https://gitlab.com/bloom42/bloom
[1] https://gitlab.com/bloom42/bloom/-/wikis/security
[+] [-] alexriabtsev|5 years ago|reply
[+] [-] hexandcube|5 years ago|reply
[+] [-] sunaurus|5 years ago|reply
[+] [-] giancarlostoro|5 years ago|reply
Website:
https://wire.com/en/
Their backend is open source unlike KeyBase:
https://github.com/wireapp/wire-server
[+] [-] rasengan|5 years ago|reply
[1] https://handshake.org
[+] [-] SkyMarshal|5 years ago|reply
[+] [-] troquerre|5 years ago|reply
[+] [-] nikolay|5 years ago|reply
[+] [-] spladug|5 years ago|reply
[+] [-] Arkanosis|5 years ago|reply
[+] [-] carapace|5 years ago|reply
[+] [-] zowanet|5 years ago|reply
[+] [-] dethos|5 years ago|reply
[+] [-] nanomonkey|5 years ago|reply
[+] [-] Aachen|5 years ago|reply
app https://f-droid.org/app/se.manyver / website https://www.manyver.se/
[+] [-] efreak|5 years ago|reply
[+] [-] ianopolous|5 years ago|reply
[1] https://book.peergos.org
[2] https://github.com/peergos/peergos
[disclaimer: Peergos founder]
[+] [-] freewizard|5 years ago|reply
And there'll be definitely alternatives, which is the beauty of FOSS.
[+] [-] atonse|5 years ago|reply
But I want to get ahead of the concern that Keybase is now owned by a Chinese company, which instantly compromises it.
PGP is dead on arrival, since it's an overcomplicated mess.
Keybase felt like WireGuard for its use case, just dead simple and also secure.
Update: I just want to clarify that I am happy for the Keybase team. This is clearly an Aquihire meant to bolster Zoom's security talent. And as a Zoom user, I'm generally happy about this development. But there will definitely be a concern about them being acquired by a Chinese company.
Update #2: I thought about FooBarWidget and others' comments, and I'm going to alter my wording. Zoom isn't a Chinese company, but their development team has been entirely based in China all this time and there have been concerns about that (which are entirely legitimate for certain groups like governments, in my opinion), especially given their communications aren't e2e encrypted.
[+] [-] FooBarWidget|5 years ago|reply
I am very put off by this anti-China rhetoric. Everything that even has a remote connection to China is now under suspicion. This is madness.
[+] [-] rasengan|5 years ago|reply
WireGuard, however, is "decentralized" because you can run it yourself whereas Keybase was always a centralized service where you always had to trust someone else instead of yourself or a public blockchain!
That being said, congratulations to the keybase team! :-)
[+] [-] perillamint|5 years ago|reply
They showed us they don't think security seriously at all through their actions. For example, they opened up lots of holes(local HTTP server to bypass app open dialogue, local privilege escalation via their webcam/mic hack) on the user's system to provide "better" UX. They just cannot be trusted.
[+] [-] thecureforzits|5 years ago|reply
https://www.aclu.org/other/surveillance-under-usapatriot-act https://www.eff.org/deeplinks/2020/03/earn-it-act-violates-c...
[+] [-] Kinnard|5 years ago|reply
[+] [-] upofadown|5 years ago|reply
Er what? The complaint about PGP is that it is too simple. Users have to know too much about how public key cryptography works. The suggested alternatives are much more complex.
[+] [-] cybdnb|5 years ago|reply
[+] [-] lucb1e|5 years ago|reply
[+] [-] 3JPLW|5 years ago|reply
[+] [-] astrostl|5 years ago|reply
[+] [-] divbzero|5 years ago|reply
> ideally either FOSS or at least not run by a for-profit company
I agree with these aims, but ideally I’d hope for the alternatives to be decentralized as well.
[+] [-] frellus|5 years ago|reply
Or Signal?
[+] [-] mawalu|5 years ago|reply
[+] [-] SamWhited|5 years ago|reply
[+] [-] m4lvin|5 years ago|reply
[+] [-] hexandcube|5 years ago|reply
[+] [-] karanganesan|5 years ago|reply
https://signal.org/en/
[+] [-] expialidocious|5 years ago|reply
[+] [-] nske|5 years ago|reply
[+] [-] mvanbaak|5 years ago|reply
KBFS: personally I switched to gpg encrypting important files on a NAS with encrypted backups to amazon glacier and backblaze.
Git: gitlab, github, bitbucket (just to name a few)
Encrypted messages out-of-band: Just use plain pgp/gpg
[+] [-] tonyarkles|5 years ago|reply
None of those hide the contents of your repo from the company that's hosting it. I suppose self-hosted Gitlab hides it the same way that Keybase does (the company's software sees your repo, but it's not stored in plaintext on their disks)
[+] [-] seemslegit|5 years ago|reply
[+] [-] FunnyLookinHat|5 years ago|reply
[+] [-] mk4p|5 years ago|reply
[+] [-] CalmStorm|5 years ago|reply
Not sure what is the best way to verify Twitter/Github account though. This has to be managed by users themselves. E.g. one user posts a proof in the Twitter account, the other user verifies the proof by checking the proof against the public key posted in the database.
[+] [-] SujiYan|5 years ago|reply
Also for binding social account -- maybe take a look of https://Maskbook.com & https://github.com/DimensionDev/Maskbook - able to send encrypted post/comment on fb/twitter etc