![]() We encourage you to submit a response to our poll to vote on the missing features youâd like us to add. Whereas others are still planning long-term migrations to post-quantum crypto, Cyph was built with it in mind from the start, meaning that your private data is theoretically protected from future QC attacks today. Post-quantum encryption, key exchange, and signing algorithms are used throughout the application (in combination with classical crypto such as elliptic curves).No need to verify keys or usernames out of band, meet up in person to compare fingerprints or âSafety Numbersâ, etc.Automatic strong public key authentication for all users.The full functionality is available regardless of whether you use or the desktop and mobile apps, with no need to worry about degraded security on the web. Whereas Keybase splits up its features between the web UI, the CLI, GPG, and the native apps, thanks to WebSign Cyph is able to provide a consistent experience across all platforms. ![]() And now, with our latest release, weâve built out a set of PGP key management and utility features to make Cyph more immediately useful for users coming from Keybase.Īdditionally, the architecture of Cyph yields some significant broader advantages: Wasm is a fast, light alternative to Linux containers try it out today with.On the minus side, Keybase offers some awesome niche features (like encrypted git repos) that we currently do not.On the plus side, our features include voice/video calling (with group support), Bitcoin, and social networking (like Twitter, but all posts are signed + optionally encrypted for a subset of your contacts).Thatâs why weâve spent the past month building new features to make Cyph more of a direct replacement.Ĭyphâs features and general architecture are similar in many ways to Keybase, plus/minus a few features: Keybase is great, but a full alternative is clearly needed. However, no single solution has so far stood out from the crowd instead, users are faced with the prospect of setting up a hodgepodge of independent solutions. Many Keybase users are now looking for alternatives as a result, primarily due to a lack of trust in the new ownership to maintain high privacy standards, as well as speculation that the service is now doomed to ultimately be shut down. One of our major competitors, Keybase, was acquired by Zoom last month.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |