 Welcome back, everyone. Today, I'm going to be talking about Keybase. And Keybase actually has a lot of different features, so I'll try to be as concise as possible about all of them. So first off, Keybase, you can find at keybase.io. Basically, it's a tool, a website, a collection of tools that helps to establish Web of Trust and associate that Web of Trust with our social network. So Web of Trust, if you have ever used GPG or PGP, basically, whenever you generate a public and private key, you need to know, you know, which public and private key to actually trust. So how can we associate a key with a given person? Because anyone can generate keys, and anyone could potentially use a fake name whenever they generate those keys. So how can we actually know who owns which key? And we do that by basically key signing. And whenever we sign these keys with our own keys, if we know we verify that this person actually owns the key, then we are building what we call the Web of Trust. So Keybase tries to help build this Web of Trust by associating our key with mostly social networks and websites that we own. So for example, I have my GPG key available. The public key is publicly available. And I've associated that key with my, for example, Twitter account cybercrime tech with my GitHub account, J.I. James, and my website, cybercrimetech.com. All of these things have been verified to be owned by me, basically. So if you can trust that, you know, I actually own cybercrimetech.com, then you can trust that I actually own this key as well. So this is just another way to try to verify identities. And it's a much more, let's say easier way, not without its flaws, but it definitely is an easier way to try to verify someone's ID. So for example, if you tweet, or if you see my tweets on cybercrimetech on Twitter, you want to follow me and you know that I'm the person behind that account, then you can actually identify, go to Keybase and say, okay, well, cybercrimetech at Twitter, what is his key? Well, his key is this key that's available right here. So then you could very easily find out whose, which key should you be using if you want to communicate with me? That's basically what what Keybase is designed to do. But it also has a lot more features that you can use. So I'll talk about a couple of features right now. This is the the Keybase IO website. And my username for Keybase is Joshua James. So Keybase.io slash Joshua James is where you can find information about me, the social networks that I've verified and the key that I've verified a little bit of blurb about me. Whenever you're at the website, there's a couple of different things you can do. Let's let's just scroll down a little bit. So it's kind of like a little bit like a social network because it is associating your social networks. And they want to be able to make communication, especially encrypted communication between people easier. So there's a couple of things we can do here. There's this browse Joshua James signed public folder. I'll talk about this in a second. But basically, this creates a publicly accessible folder, where all of the documents you put inside that folder are automatically signed by the key that you have registered. So imagine that you're doing a software release. Normally, we would, you know, create the installer or the package. And then we would sign the package and then distribute both the signature and the package together. In this case, all you have to do is put the package inside your signed public folder. Keybase automatically signs the package for you. And then you know that everything in that public folder is signed by that particular key. It also has like I said, social social networking kind of function. So you have followers and followers and following. Currently, I'm following a few people, but not very many people follow me. So please follow me if you want to be able to communicate securely. And then it has others that are kind of related in different networks. So followers and following makes a difference for, you know, public public and private folders that are available to you just by browsing. But you can you can add anyone in the network as long as they have an account anytime. And they also have an interesting feature for people who don't have accounts yet, which I'll talk about in a second. Also from the webpage, other than verifying getting the code basically to verify your, your accounts, which I won't show you how to do, but basically follow very easy instructions to verify different types of accounts. There's also a couple of features to, for example, do key base chat and PGP encrypt. So at the top, I have some invites, by the way, if you want to use some invites at the top, they're had there's send encrypted message, decrypt a message, sign a message and verify a message. So we probably recognize all of those things. But for example, let's say that I don't have the group. I hope I pronounce that right, group. Let's say I don't have his key in my key chain. I can just go to his key base IO group account. And I know the group Twitter account handle is actually that. So if I trust that he has control of he or she, I don't really know he has control of this Twitter account, then I can trust that this is his key. So for example, I could go to PGP encrypt. And then his username is already selected. So even though his key is not in my key chain right now, I can still send an encrypted message to him. Hello, encrypt. Now I have an encrypted message encrypted with his public key. So then I could, for example, send this Twitter and he could get it and decrypt it. There's also the decrypt option. So decrypt is command line, basically command line only because I am not hosting my private key on key base, there is the option to put both your public and private key on key base. I currently don't have my public key on key base. So I can't use the online tools. But if you put your public key up there, you can decrypt messages using this interface. Same for signing. I don't have my public key. So I can't sign anything on this interface. I have to use the offline tool and then verifying as well. Yeah, so message to verify if we can verify like normal in GPG. So those are basically the encryption signing verification options that are available via the interface. The web interface does a couple more things. You can see, for example, the public folder, all of the documents that they've publicly shared, and you can connect with new people. So let's say Mark, if Mark has, he has no public files shared. Okay, maybe I can find someone with some public files. Okay, yeah, so Godwin has a couple files shared publicly. And all of these have been signed by him. So if I click on his public signed folder, I can see all of these files. So read me, MD. Yeah, so he's basically just saying I've shared this with the world. They also, he's published his key so that way I can download his public key from this public share. He also did hello world. Okay. Yeah, so all of these documents have actually been signed by him. And I can verify that they have been signed by him using an offline tool. Okay, so another thing that I can do, if you look at mine, I have this index.md. And I also have my keys, the public key. So I'm sharing my public key via keybase. And I have index.md. If you go to right now, I'm at keybase.io, Joshua James, if you go to Joshua James dot keybase.pub, then that markdown file basically comes up as index.html. You can make markdown web pages that are publicly or that are signed by your that are signed by your key automatically, and they're publicly available. So you could put different contents in here, just like a web page. I'm also hosting, I'm also hosting my key, like I said, so anyone can publicly access that folder. And I will show you if I can, I'll show you the folder right now. So locally, I have this folder locally, I have the keybase client installed, this is what the keybase client looks like in Linux. I have the keybase client installed. And whenever you have it installed, a folder is created called slash keybase slash keybase. And this public signed signed public folder corresponds with the public folder here. And then these are all of the different users that I'm following or mostly following. And if I go to myself, then I can see the two files that I've made available publicly available. If I do and create a new file, let's see, I open a terminal, terminal, touch, test. Okay. So now I've created this test file. And it should also be available in the public folder. So keybase has automatically anything that I put in this public Joshua James keybase automatically signs this file and uploads it to a public share on hosted on the keybase keybase servers in total for I think both public and private you get 10 gigabytes total per user. And if you share files between different users, only the person who shared the file gets their quota used. So here I have this uh, tested or this signed file automatically signed from my public key private key. Okay. Right. So that was the public folder. So we also see that inside public I can see all of the different users that I'm following inside private. I have my own folder. And this folder is anything I put in it is automatically encrypted and uploaded to the keybase IO server using my GPG key. It is automatically mounted. So if you if you automatically start a keybase, then this folder will be available every time you log in or however, however it is that you're mounting it. Anything I put in here gets automatically encrypted. And if I want to I'll show you in a second how you can use private folders to share information with other people as well. Okay. So let's go back to keybase. That's pretty much it for for the main web interface. Basically, you upload a key, you verify some of your social networks and that kind of attaches it and then people can use this interface to find you or search for, for example, your your name, you can look for other people as well. Pretty straightforward. Something that's relative that's new here is a keybase chat. They just added keybase chat, which basic which uses your key pair to encrypt chat in didn't do in the encryption over over their their infrastructure basically. So if you do a keybase chat, if you have the keybase chat plugin installed for Chrome, then you can write a message and just start chatting with the person. So I'm right now I'm chatting to myself so I can just say hello, send it. Okay, chat sent you can continue the conversation your keybase app whenever they write back to you it does not show up in this application you've just started the chat. That's it. So I close that and then I need to go to my actual keybase application which I'll talk about in a second and go to the chat area. And I can see from Joshua James hello. Okay, so then I can write back hi. And whenever I write back hi, both of these are obviously are encrypted end to end whenever I use the keybase chat chrome extension. It's basically just using the keybase command line as a wrap. Yeah, it's using a wrapper to interface with the keybase command line and send messages back and forth. So I'm just currently talking to myself so only one key is being used. Or yeah. But if I'm talking to somebody else, for example, my friend who has never, not never gotten on keybase but I hope he does someday. He's actually has an account at GitHub. So I can detect him and I can send messages to him. So for example, hello. And whenever he, even though he's not on keybase yet, whenever he does join keybase, then he'll receive all of my messages. That's it. It just doesn't sync up yet. So Joshua James, I'm talking to myself and it's encrypted. I can check to see whether the the message has been signed by clicking on these three dots encrypted and signed and the device that was used to encrypt and sign everything it's green. So everything looks okay. I can also edit the message because I'm the one that sent it. And I can also delete the message for everyone. So this does actually remove it completely. Okay, so that's chat a little bit more inside the keybase app. Chat is basically the new feature using end to end encryption. You can send attachments. You can send all sorts of things. And there is a app for Android. I don't know if there's an app for iOS, but Android definitely works. So for example, from from my phone, I can say from my phone and send and because it's basically using it's using my key, my key is available on my phone and on my computer. So I can send messages and see encrypted messages on both places. So for example, telegram makes a kind of per device key. So if you use secure chats, you can't see secure chats on your computer and your phone, you can only see it on individual devices. But in this case, because your your GPG key is synced between between devices, I can see it on both. You can also send images and other attachments. Okay, so I can send images. I can chat from my phone from my desktop. And if I'm using somebody else's if I'm actually chatting with somebody else, then I'm using their key to encrypt all of the conversation basically to them, they use my key to encrypt the conversation back to me. And Keybase takes care of all of that. Basically, we can just type like normal. Okay, I can also delete messages. Whenever I delete messages, then they are gone. Okay. Yeah, so that's a little bit about Keybase Chat, a new feature that's pretty interesting, especially now that especially, especially now. The other thing that I was talking about before are folders. So I can see my public folder. And that's basically just the same view as I had before. Whenever I went to public. This is in my kind of, we can call it explore basically, in explore, we can see Keybase public. And I can see my files, the same for public, Joshua James, and I can open the folder and see the files. This does not yet work for mobile, but they say that they're going to do file sharing in the mobile app soon. I also have private, where right now I have my own private folder. So I can open my private folder. And these are just for me, I'm not sharing with anyone else. And then I can also, for example, do let's say, who was I, who was I looking at before? Yeah, okay. So let's say I know the group, I can go to Twitter, I know his Twitter name. So search Twitter, the group. Okay, see, there's multiple ones. So I'm not really sure which one it is. But I'm pretty sure it's that one, because I know it's his icon. But I would check more than this. Now, whenever I open up his account, basically his account, I can do open public folder, and see if he has any files, and he's not sharing anything publicly, I wouldn't want to download it anyway, because I have no idea what he would be sharing. Okay, and then I can also start a chat, which just starts the chat like normal using his PGP key. And then I can also open private folder. And what this does, if you see a key base private Joshua James comma group. And what this does is now create a shared space that uses both of our keys to encrypt the documents. So if I put any documents in here, then he can access the documents with his key. I can actually access the documents with my key. But no one else can access it's basically encrypted into end file transfer. Again, there's about 10 gig worth of space that you can use. So the naming structure is basically two account names with a comma in between them two or more account names with a comma in between them can make a shared encrypted space as long as everyone has their keys available and everyone does have their keys if they join key base, that's what you have to create. So this is pretty interesting because if you want to make a shared shared encrypted space between two people, or two accounts, then this is an easy way to do it. For, for example, my friend need to look at his again. So for example, he's at KOLYAAK. So KOLYAAK. Okay. So yeah, we haven't made one yet. Okay. So what I can do, basically is whenever I want to make a new share, even with a user that doesn't exist yet, then I can basically just put in the user's name with a comma, and using the key base command line or the key base application, I can create a new folder that's just shared between my friend and I and then whenever they join later, then they can still have access to all of the documents. Yeah. So it's pretty interesting how they allow users with no account yet to be able to access the data and kind of wait for them essentially until they need it. So yeah, that's basically it for the file sharing. Okay. So file sharing. What else? Yeah. So you have basically an Explorer version that's very handy to just dump files into. You can either automatically encrypt or automatically sign. There's the online interface that lets you do some types of encryption, decryption, look at other people's public and potentially private folders, but you really need the application installed to do a lot of it. There's the app that's installed where you can look at different folders, you can chat and add devices and change some very basic settings. Basically, this app is almost exactly the same as the app that you would find on your phone whenever you install it on your phone has all of the same features and pretty much the same look as well. And then there's also the key base that you can use from command line right now. I'm just in the folder structure. So just like this folder key base private and public, I have my private and public and I can see Joshua James Grooke. This is the shared folder that we just created. I can also run the key base command and see all of the different options. They have a lot of different options that you can run from command line. So that's very handy as well. So basically, if you want to use command line, if you want to use the GUI, if you want to use it online, if you want to use it from your phone, all of those options are available and it makes it pretty easy to do a lot of different tasks depending on what you're trying to do. Sharing files is extremely easy. Chatting now is very easy. You can run, for example, a key base through tour. And basically that's for trying to keep anonymous. If you're sharing files between each other, it does leak some information. You can run it through tour. So it intentionally doesn't leak or leaks the minimum amount of information possible, basically. So there's a lot of very interesting features for key base. And there's a lot of different ways to access it. So what I recommend is just go through and first create an account. If you need an invite, let me know. I have a few. And yeah, it's pretty interesting tool. And I think, I mean, in the time I've probably been using it on and off for about maybe a year, year and a half. And it's just gotten better and better. So I think it's going in a very interesting direction, especially now with chat. So that's it for key base. Thank you very much.