Keybase
Keybase is a key directory that maps social media identities to encryption keys in a publicly auditable manner.
Score
Citation
Keybase and third parties do not have access to this information.
We do not share or sell your personal information with third parties for their marketing purposes.
Even if there is a reasonable delay before the data is fully deleted (as is common), the data still counts as "permanently deleted" and satisfies the parameters for this question.
Score
Citation
You have control over your personal information and how it is collected, used, and shared. For example, you have a right to:
- Delete your account and all your associated data. You can do this through your Keybase client.
- Erase or delete particular files and data. You can do this through your Keybase client. You can also set messages to delete automatically.
Notes
It is incredibly important to note that although you can delete your data, as described by Keybase as well, not possible to delete data from your sigchain. This is to ensure everyone is properly audited and is required due to the blockchain nature of Keybase.
This may come in the form of outright data sharing or by using local third-party analytics software (such as Google Analytics, which collects a plethora of user information).
Note that whether the policy allows sharing aggregated user data does not affect this question.
If the personal data is encrypted when it passes through the third-party, it does not count as third-party access (as the data is inaccessible to that party).
If personal data has been made public by, for example, posting it to a blog, it does not count as private personal information (and is therefore not considered by this question).
Score
Citation
We use the following service providers to process your personal information:
- Amazon Web Services for content storage;
- Kraken.io for resizing unencrypted images such as user profile pictures;
- Note: Users can also opt in, via the chat interface, to Google location services (with the /location command) and Giphy (with the /giphy command) but those services don’t receive personal information about you.
Score
Citation
We may disclose your information to third parties if we determine that such disclosure is reasonably necessary to: (a) comply with a valid legal process; (b) protect any person from death or serious bodily injury; (c) prevent fraud or abuse; or (d) protect our rights, property, safety, or interest.
Score
Citation
Keybase takes reasonable security measures such as password protection, two-factor authentication for internal logins, client-side encryption, and a whitelist of employees who can deploy changes to the server, as we deem appropriate to protect the information we collect from misuse, unauthorized access, disclosure, alteration and destruction. Some hosting details for the technically-minded:
The Services are currently hosted on Amazon’s AWS;
All data is transferred with industry standard TLS during transmission; and
Keybase’s website does not serve any 3rd party hosted JavaScript.
While we do use care to protect your information, no data transmission over the Internet or other network can be guaranteed to be 100% secure. As a result, we cannot and do not guarantee the security of any information you transmit on or through the Services, and you do so at your own risk.
Notes
They have been independently audited once by the NCC in March 2019 (which you can read here: https://keybase.io/docs-assets/blog/NCC_Group_Keybase_KB2018_Public_Report_2019-02-27_v1.3.pdf)
Score
Citation
Effective: January 9, 2020 (Posted December 9, 2019).
Note that all companies operating in the EU are subject to Art. 33 of the GDPR, which requires companies to notify their data protection authority of a data breach within 72 hours of discovering it.
Score
Citation
Note: Keybase never requires a phone number and no longer requires an email address in order to open and maintain an account.
Notes
The service does not require contact information to be provided, nullifying their ability to alert users of data breaches outside of via the service.
Score
Citation
We will update this Privacy Policy from time to time. If we make any changes that reduce or negatively affect your privacy rights, you will be notified either through email or the Services. If we only make minor changes that don’t reduce your rights (like changing an email address or rewording paragraphs to make them clearer), we will just post the revised policy here. Those changes will go into effect on the “Effective Date” shown at the top of the updated Privacy Policy. Your continued use of the Services after the Effective Date means you agree to the new Privacy Policy.
This includes the use of data brokers and independent verification authorities (such as background check providers).
Score
Notes
No information proving so.
Score
Citation
Here’s how we use your information:
- To provide the Services to you on all the devices you add.
- To protect our Services and users. For example, we will use it to investigate suspicious activity and attacks.
- To improve Keybase for all our users. For example, we will make development decisions based on what features our users are using.
- To communicate with you about Keybase. You can unsubscribe from those messages (unless they are specifically about your account, and then we have to send them to you).
Some services allow users to opt-out or opt-in to of non-critical collection or use of personal data, such as collecting data for personalized advertisements.
Score
Citation
Users can also opt in, via the chat interface, to Google location services (with the /location command) and Giphy (with the /giphy command) but those services don’t receive personal information about you.
Score
Citation
What personal information do we collect?
Contact and account information: We collect the information you provide to us, such as your name, avatar picture, email address, and social media handles. Note: Keybase never requires a phone number and no longer requires an email address in order to open and maintain an account.
Team names and membership: If you create or join a team on Keybase, we collect and store the names of the teams and subteams, their membership, and when they were formed.
Hashed password: We collect and store information about your Keybase password that allows you to prove you know your password; that “stretched” password is sent to Keybase’s servers. See here for more information.
Account activity: We collect information about your activity while using the Services, such as proving you control a certain Twitter username, announcing your public key, editing your biographical information, or editing any of your social media usernames. Some of this information is aggregated, summarized, and published into the Bitcoin blockchain in order to detect and guard against certain vulnerabilities. See “Disclosures to your signature chain, the Merkle tree, and the Bitcoin blockchain” below for information on how we treat this data.
Files and Data. We collect and store files and information that you transmit to other parties using Keybase or that you elect to store on the Services. This data is always encrypted on our servers, except for documents in your public folder and your public chats. Those are not encrypted because you choose to make those publicly accessible.
Do Not Track. Keybase does not collect personally identifiable information from you to track you across third-party websites. As a result, Keybase does not specifically respond to web browser Do Not Track signals.
Unique personal identifiers. We collect and store information to identify you, such as your Keybase user ID and your IP address (which is stored only temporarily).
Network usage and activity. We collect certain technical and analytics data, for example the type of device you’re using to access our Services or the operating system you’re running. Keybase is designed to store the minimum amount of technical data for the shortest time necessary in order for you to have the Services across all the devices you add.
Interactions with us: If you email us, we may keep the content of your message, your email address, and your contact information to respond to the request and otherwise follow up as necessary.
Last Updated
June 24, 2020
Sources
Contributors