-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 06/24/2014 05:15 AM, Cathal Garvey wrote:
The problem with Keybase is that the infrastructure they're based upon, PGP/GPG, is probably not using modern key generation algorithms by default for symmetric encryption of keys. So, how many keys are
This should be pretty easy to test. Anybody got a spare keybase.io invite that they're willing to burn for a test run?
not-entirely-trivial to crack. But keybase can't even enforce that, because the PGP infrastructure is too legacy-laden.
I have to agree with you on that. - -- The Doctor [412/724/301/703] [ZS] Developer, Project Byzantium: http://project-byzantium.org/ PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ "Gentlemen, you can't fight in here! This is the War Room!" --Merkin Muffley -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJTqbOsAAoJED1np1pUQ8Rk+YAP/2PqSBpPRE1yIM7NmWllQ0XU /GmWHSTJ2ptuhyBiXgtg7crMfR8ov0eP/IVtgJ6ZW+MMyPvclPvKKKg5lUCpO6c2 kIO4HjmacZ7JoZh0hF2ps80Xa2/xOxJc1lAgvpNEQe3SWVFcxQXzqYLYAFgtL3Mv OatPP+H5m0g2dQY1+/4uSWx24FjVNjFbiYEUc6C1sdouwwPA2MqrcnnnOOJ5xDf4 qotisNUu3Zt9jc4KT5cGdAJKkLcGMStH4bzhwX6a1N+5y5lwKqB5VPhAx8O0kh8D Hv3TcxnXVMAtgVN7ruj20Zxm4Z5lHTWX0DmdxkCH0o8BXWXUT44ijxj6y/VTT9eu 9nIagrAryCid8ihL7RaLBvzBOd6xHEFg4VVvzASWsElp9HIBnxE1QUFMz48PzbjO 308LiEc4FvNjyf1XjtStJNNssXP9Wcc8pNzitoRU+F+4cQJUPrsE45xCMJ8VFK47 cu6yJGEfVboG9mpzTCKIllvm7vgDKtssGqTpNoOGus+Vc4jxqFBug0NX9vlPRtmC rgcLlp2srL2LeWqYOfIkYBcGxFat6702UoE22c9o6RINW+/6YXrg4jpvRcmEJHI5 VSQD0aN6AANovhRqD6DYUYRLBCb3utACExK8I/zTXy3e4U9hS0/sFxPRKcWt8oQS SqCtDCFXL2Y6vmPmQ27G =UnFY -----END PGP SIGNATURE-----