Keybase teams9/6/2023 The announced deal comes after Zoom added more rudimentary security features, like defaulting to the waiting room option so the meeting host can control who joins, and forcing people who join manually to enter a password. The Keybase service will be part of Zoom's paid offering, not the free service. "Teaming up with Zoom really gives us an amazing opportunity to apply all our technology and all our expertise at a scale that's much larger." "These are subtle problems and we've been working on this problem for roughly five years, and nothing else," said Krohn. Yuan said after he talked with Krohn and dug into Keybase's software, he was convinced this was the right deal. In early April, Yuan hired former Facebook security chief Alex Stamos as a consultant to help the company beef up its efforts after apologizing to users for falling "short of the community's - and our own - privacy and security expectations." Within days, Stamos was on the phone with Keybase co-founder Max Krohn, and the teams started working toward a deal. Zoom has acknowledged that it was unprepared for the sudden spike in usage, which has surged thirtyfold since the end of December as millions of office workers were forced to comply with lockdown orders. Yuan has made security his primary focus over the past month, after Zoom was hammered by critics for allowing "zoombombings" from unwelcome guests, allegedly misleading investors about its level of encryption, and revelations that its app shares personal data with Facebook. ![]() Yuan said it's critical that users know that the encryption key is not on Zoom's servers, so the company has no access to the contents of the call. That setting will prevent anyone from calling in by phone, which is one way people can access meetings, and will disable cloud-based recording of the chat. When Keybase is implemented, the Zoom user who schedules a meeting will be able to choose end-to-end encryption. Zoom CEO Eric Yuan told CNBC the company needed a solution for users who are demanding the highest level of privacy and certainty that uninvited participants have no access to their conversations. The acquisition of the 25-person start-up is the latest move in a 90-day plan that Zoom announced on April 1 to fix its security flaws. Personal Loans for 670 Credit Score or Lower Personal Loans for 580 Credit Score or Lower Please click here to view this show’s transcript.Best Debt Consolidation Loans for Bad Credit Thanks to We Edit Podcasts for partnering with SE Daily. Software Engineering Daily listeners can go to /sed to get 20% off the first two months of audio editing and transcription services. We do break down the basics of Keybase, but if you want a more thorough explanation, you might like to check out that older episode, you can download the Software Engineering Daily app on iOS or Android to find all of our old episodes. Max was on the show a few years ago to discuss the basics of Keybase, and in this episode he explores some of the abstractions that Keybase has built on top of its core identity tool–Keybase File System, Keybase Teams, and Keybase Git. ![]() Max Krohn is a founder of Keybase, and was previously a founder of SparkNotes and OKCupid. Keybase is a company that attempts to solve the problem of key distribution by having users connect social media accounts and devices to Keybase, in order to collectively verify who you are, and then give you the power to share your public key. ![]() Serious encryption advocates will sometimes meet in person to exchange pieces of paper containing public keys. Key distribution undermines the usability of PGP encryption. In both cases, Bob needs Alice’s public key! If Bob gets that public key from an email message, Bob is trusting that the email message is secure–and if Bob can’t ever verify that first message containing the key, he has no way to verify the messages that come after it. ![]() Public key encryption also allows for signed messages–so that when Alice signs a message, Alice uses her private key and Bob can verify it if Bob has her public key. A message sent from Bob to Alice gets encrypted using Alice’s public key. Public key encryption allows for encrypted, private messages.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |