Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
PGP AND
KEYBASE
Gabor Szathmari
CryptoParty Belfast, 2015 November
PGP in Action
Man in the Middle
EAVESDROPPERS
The Who and Where
PGP KEY
VERIFICATION
https://www.gnupg.org/gph/en/manual.html
http://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html
http...
“[…] the researchers got
ten pairs of participants
to try to install and use
Mailvelope.
One pair managed to get as far as...
[…] Zimmermann said he couldn’t decrypt
the [PGP encrypted] original message
because he didn’t “have a version of PGP
that...
Keybase Use Cases
GABOR SZATHMARI
@gszathmari
https://blog.gaborszathmari.me
http://bit.ly/keybaseme
Photos
https://flic.kr/p/8M7Tf5
https://flic.kr/p/kW6Zba
https://flic.kr/p/9eYdRM
https://flic.kr/p/m5ymC9
https://flic.kr...
PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)
Upcoming SlideShare
Loading in …5
×

PGP and Keybase (CryptoParty Belfast)

379 views

Published on

PGP public key exchanging process is susceptible to MitM. Although built-in features exist to verify the authenticity of keys, but usability of PGP has always been a pain. Keybase offers a solution by providing key validation over social network profiles.

Published in: Technology
  • Be the first to comment

PGP and Keybase (CryptoParty Belfast)

  1. 1. PGP AND KEYBASE Gabor Szathmari CryptoParty Belfast, 2015 November
  2. 2. PGP in Action
  3. 3. Man in the Middle
  4. 4. EAVESDROPPERS
  5. 5. The Who and Where
  6. 6. PGP KEY VERIFICATION
  7. 7. https://www.gnupg.org/gph/en/manual.html http://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html https://www.linux.com/learn/tutorials/760909-pgp-web-of-trust-core-concepts
  8. 8. “[…] the researchers got ten pairs of participants to try to install and use Mailvelope. One pair managed to get as far as trying to share their public keys, but didn't really know what to do with them.” http://www.theregister.co.uk/2015/11/02/email_crypto_is_as_usable_as_it_ever_was_say_boffins/
  9. 9. […] Zimmermann said he couldn’t decrypt the [PGP encrypted] original message because he didn’t “have a version of PGP that runs on any of my devices.” http://motherboard.vice.com/read/even-the-inventor-of-pgp-doesnt-use-pgp
  10. 10. Keybase Use Cases
  11. 11. GABOR SZATHMARI @gszathmari https://blog.gaborszathmari.me http://bit.ly/keybaseme
  12. 12. Photos https://flic.kr/p/8M7Tf5 https://flic.kr/p/kW6Zba https://flic.kr/p/9eYdRM https://flic.kr/p/m5ymC9 https://flic.kr/p/9rBMDo http://www.bloomberg.com/bw/articles/2013-11-12/wi-fi-networks-shouldnt-become-spy-networks http://thehackernews.com/2014/04/dutch-court-accepts-to-extradite_19.html http://www.engadget.com/2015/04/09/new-macbook-review/ http://www.bluecorenetworks.com/data-center/

×