Open haasn opened 8 years ago
Another scenario I'm interested in:
Suppose somebody roots the keybase.io server. As I understand it, there is a special key stored on the keybase.io server itself which can be decrypted using my passphrase.
Now as I understand it, to login on keybase.io I have to provide my passphrase via HTTPS to the server, right? So if keybase.io intercepts my passphrase and then gets my encrypted key from the database, an attacker could use that key to revoke all of my devices and then perform a complete takeover of my account.
What security measures does keybase have against this? Two I can think of:
Either way, keybase needs to be designed to permit failure or malicious takeover of keybase.io.
Again, apologies if this is a duplicate issue but a quick search picked up nothing obviously relevant.
I'm wondering whether you could clarify, perhaps in https://keybase.io/docs/server_security and the related documents (e.g. a list such as https://en.bitcoin.it/wiki/Weaknesses) about what exactly would happen to keybase under a certain number of possible future scenarios ranging from benign to “doomsday” in nature.
For example, here are some questions I'm concerned with and how them occurring would affect keybase as a software, a service and a concept (respectively):
And probably more that I'm not thinking of right now. I can see from https://keybase.io/docs/server_security that keybase is applying a strong design of distrusting the central server, and I think this is a very healthy design choice. But I'm still wondering about what the real-world ramifications of a dead server would be, since as I understand it keybase still relies on a central API and reference point.