
This feature is available on all Keybase clients, and when functioning as intended, exploded messages should instantly self-destruct across all devices that have access to a chat.Īfter identifying CVE-2021-34421, a mobile-only Keybase vulnerability in which exploding messages could be retained by moving the Keybase app out of the foreground, Olivia O'Hara aimed to discover whether there was a way to achieve the same result on Keybase desktop clients.Īfter examination, O’Hara identified multiple ways to retain exploded messages on desktop: Users can also manually explode messages if they decide the message is too sensitive for others to retain for the duration of that predetermined length of time. When activated, Keybase’s chat explode feature allows users to send a message, and then have it automatically “explode”-or self-destruct from all users’ devices-after a predetermined period of time. Olivia O’Hara - /oliviaohara Identification This process was not known to be tested on any Linux distributions.
Keybase android windows#
Zoom staff handled further Windows testing.

Keybase android windows 10#
This researcher used macOS platforms to identify and test the vulnerability, but was able to reproduce by following the same process on a Windows 10 VM (VirtualBox), simulating sleep with VirtualBox's "Save the machine state" option. This vulnerability affects desktop versions < 5.9.0. Using this method, an unscrupulous individual with access to a conversation could recover sensitive data. How does this work? When the Keybase desktop client is operating, a user can switch out of Keybase’s Chat tab and put their computer to sleep if a second user explodes a message in a shared chat during that time, the message will still be visible to the original user when they return to the chat.
Keybase android free#
Share your thoughts with us and feel free to make your own app suggestions in the comments section below.Wednesday, FebruCVE-2022-22779 :: Keybase App Vulnerability: Retained Exploded Messages in Keybase Clients for macOS and Windows In desktop versions of Keybase older than 5.9.0, users can easily retain "exploded" messages with a few clever clicks, meaning your sensitive chats may still be read after you want them gone. Have you used Keybase before or did you just find out about it like I did? Do you think it does a better job than some of its alternative apps?
Keybase android code#
If you want code signing key, you can get it here and verify it here. To restart Keybase after an update, type run_keybase, it will kill and restart everything, including the KBFS fuse mount. Once you follow these following instructions, you will get a new versions of Keybase installed on your system. Mind you, you will need to have Tor SOCKS proxy running locally on your machine before you can use Tor with Keybase in your command line. Tor has the setup in its documentation and you can follow the guide provided by Keybase here. Automatically syncs data across connected devices.Chat securely with any Facebook, Twitter, GitHub, Reddit, and Hacker News user.Supports native notifications including and popup.Supports Tor in the command line – Users can protect their identity thanks to Tor’s famous anonymity algorithm.Open-source – with code available for contribution on GitHub.Available on multiple platforms including Chrome/Firefox, GNU/Linux, macOS, Windows, Android, and iOS.Chat in groups and use # tags and mentions to make communication and searching easier.Conversations with people across the world without knowing their phone number or email address.An eye candy GUI with well-organized panels, tabs, animations, and settings.

It also boasts the ability to initiate conversations with people across the globe without using a phone number or email address, use Tor’s anonymity feature in the Command Line, use # tags and mentions, create groups, among others.

It is free and boasts a clean modern User Interface on all GUI-supported devices. Keybase is a relatively new open-source chatting application for computers and mobile phones and it is powered by public-key encryption.
