Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

We're not big fans of browser PKI either, but we're using it as scaffolding that hopefully one day can be torn down.

`keybase-installer` needs an initial install over https from npm. We unfortunately saw no way around this.

Assuming that install succeeds with integrity, then all future upgrades of the installer and client are verified with PGP keys stored locally on the client.

Once the client is installed, it speaks HTTPS to the server, but we're not trusting the root CA. Rather, we sign with our own CA that we ship with the client.

The proofs themselves, on twitter and github, all can be verified in the clear, as FiloSottile points out, but of course relying upon the HTTPS certificates of twitter and github to make sure the proofs weren't corrupted in transit between those services and the client.



> `keybase-installer` needs an initial install over https from npm. We unfortunately saw no way around this.

Write it in a language that has a packaging system not designed by amateurs.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: