Akbar's Quest: A Work In Progress Mac OS

broken image


↳ Mac OS Beta Testing ↳ Bugs ↳ Suggestions ↳ Vanilla Gamers; American Truck Simulator ↳ Announcements ↳ General discussion about the game ↳ Frequently Asked Question ↳ Help center - player to player ↳ Technical Problems ↳ Gameplay Questions ↳ Mods ↳ Maps ↳ Map assets ↳ Models ↳ Trucks ↳ Trailers. It its current form the malware appears to be a bit of a work in progress. Ransomware functionality appeared to be a little spotty and failed to encrypt files on some researchers' test systems.

Alpha releases of the Keybase app are starting to come with a cryptographically secure file mount. It is brand new. And very different.

Public, signed directories for everyone in the world

You can now write data in a very special place:

Or, in Windows:

Setting up the HP Z800 Workstation, a work in progress guide INFO/GUIDE ALL CREDIT goes to SBC-Studios (whose guide I used as a template), chatdeau, Rockey12, the makers of the kexts, and ZoroZZ all of the Insanely Mac Forums, plus many users on the Corpnewt Discord Server. To be absolutely clear, Apple offers a Rosetta 2 emulation layer in macOS Big Sur — the only version of macOS that will run on Apple's newest M1 Macs — that allows all existing Mac apps to. Borrow a Mac from someone you know in order to download OS X and prepare your USB. Purchase a Snow Leopard DVD from Apple. Install OS X on the target computer using the appropriate version of iBoot. Get it working with 10.6.8, with built-in Ethernet, in order to access the Mac App Store, download OS X, and build a USB installer.

Every file you write in there is signed. There's no manual signing process, no taring or gziping, no detached sigs. Instead, everything in this folder appears as plaintext files on everyone's computers. You can even open /keybase/public/yourname< in your Finder or Explorer and drag things in.

Here's my public folder:

Or maybe you know me another way. In that case you can assert I've bi-directionally connected an identity to my keys. These folder names also work:

In my folder you'll find some techie things, such as my SSH public keys, my Signal app fingerprint, and some software I've manually verified and want to distribute safely to friends.

What you put in your folder is up to you: the world will rejoice knowing they're seeing the exact same bits you're seeing, without any risk of server-side or man-in-the-middle evil.

Thrustworks mac os. When you access a stranger's folder (say, mine),

The popup shows plaintext and plain usernames. Here's the ugly work it hid:

  1. requesting that user's info from Keybase (keys + proofs)
  2. playing back the user's signed announcements & revocations
  3. actually scraping tweets, posts, profiles, etc.
  4. verifying the assertion you made passes, cryptographically
  5. if everything pans out, downloading blocks
  6. making sure the blocks are signed, and
  7. reconstructing the folder
  8. presenting as plain files

Unlike Dropbox, Google Drive, and Box, there is no sync model. The files stream in on demand.

If you want some more info, go ahead and look at this text file, signed by me:

Keybase.pub

As a proof-of-concept, https://keybase.pub is a website that serves static content straight out of /keybase/public. You can see my plan.txt file at https://keybase.pub/chris/plan.txt. The site is also a work-in-progress.

But there's more!

Keybase mounts end-to-end encrypted folders in /keybase/private.

This is your own encrypted folder, just for you:

And here's a folder only you and I can read. You don't have to create this folder, it implicitly exists.

Again, maybe you know me on twitter, and prefer to assert that:

These folders are encrypted using only your device-specific keys and mine.

The Keybase servers do not have private keys that can read this data. Nor can they inject any public keys into this process, to trick you into encrypting for extra parties. Your and my key additions and removals are signed by us into a public merkle tree, which in turn is hashed into the Bitcoin block chain to prevent a forking attack. Here's a screenshot of my 7 device keys and 9 public identities, and how they're all related.

src: https://keybase.io/chris/sigchain

As a reminder, Keybase is open source Go. And here's our crypto spec on the file mount, which we will gladly change and update as this project evolves. (Feedback desired!)

Frictionless sharing

Soon, you'll be able to throw data into `/keybase/private/yourname,pal@twitter, even if that Twitter user hasn't joined Keybase yet. Your app will encrypt just for you and then awake and rekey in the background when that Twitter user joins and announces a key.

We decided to work on Keybase full time when we realized this key-identity solution could actually lower the friction on sharing.

In contrast, this screenshot was in Keybase's fundraising deck earlier this year:

Our goal: smack-dab in the middle of a public Reddit or HackerNews or Twitter conversation, you should be able to say 'Hey, I threw those gifs/libraries/whatever in our encrypted keybase folder' without ever asking for more identifying info. If that person hasn't installed Keybase yet, your human work is still done. They can join and access the data within seconds, and your device will quietly handle the verification and rekeying, without ever trusting Keybase's servers.

Back to you..

Anyway, if you have the new Keybase, go ahead, start a diary:

On a Mac, you could just open the folder in Finder:

And drag files on in.

Questions and other details

Paper keys

As discussed in our blog post about device keys, until our phone app is ready, you'll be asked to make a paper key. This is a full-powered private key. It can be used to provision and even rekey. Carry it in your wallet if you want to provision new Keybase installs. You can make extras with keybase paperkey and revoke lost ones with keybase device [list|remove].

Metadata and Security

The Keybase servers can obviously read everything in /keybase/public.

As for /keybase/private, Keybase can tell

  1. what top level folders you're working in (such as /keybase/private/yourname,pal),
  2. when you're writing and reading data, and
  3. approximately how much data.

The Keybase server does not know individual file names or subdirectory names. It could try to guess whether you're writing 100 small files or 1 large file, but it would be a timing-based guess. If you write a 1MB file in a private folder called /keybase/private/yourname/pics_of_me/thong.jpg, the Keybase server has no idea this is a folder called pics_of_me, or that there's a file called thong.jpg, or whether you look good. It doesn't know you're writing pictures, Excel docs, your DNA sequence, or MP3s.

'Following' people adds to security

When you follow someone on Keybase, you sign a portable summary of their identity, as you saw and verified it. From then on, whenever you use their keybase username, everything in your follower statement must remain valid. This is far more secure than just asserting one identity.

So follow people.

Risk of data loss

At the time of this document, there are very few people using this system. We're just getting started testing. Note that we could, hypothetically, lose your data at any time. Or push a bug that makes you throw away your private keys. Ugh, burn.

So as one of our first testers: back up anything you put into Keybase's alpha, and remember: we can't recover lost encrypted data.

Also, if you throw away all your devices, you will lose your private data. Your encrypted data is ONLY encrypted for your device & paper keys, not any PGP keys you have.

Work

Akbars Quest: A Work In Progress Mac Os X

Storage

We're giving everyone 250 gigabytes. Our quota model:

  • only the writer's quota is affected when writing in shared dirs. Woo-hoo! So you never have to worry about hurting another's quota or disk space (again: friction). Keybase has to work this way, since it doesn't work on the sync model or require approval before encrypting and sharing with someone.

  • history data does count towards your quota, and you'll soon have controls for how long to keep deleted blocks around.

There is no paid upgrade currently. The 250GB free accounts will stay free, but we'll likely offer paid storage for people who want to store more data.

Performance

We've made no performance optimizations yet. There's a lot of low-hanging fruit.

Iterative releases

Keybase is about to be a full-featured GUI app.

When the Keybase app offers to install an update, we encourage you to accept it. It'll be signed by us.

Public folders of interest

  • /keybase/public/libevent – the popular callback notification library. browse | glossy site
  • /keybase/public/chris - my example folder browse | glossy site

I'll add some people above if they're known authors of popular packages or well-known people. Email me if you've got anything interesting (chris@keybase.io).

Bug reporting

If you encounter a bug of any kind, please run this:

That will (1) package up your logs for us and send them in, and (2) generate a pre-filled github issues page containing an id for your logs.

Business Model?

We're a long way off from worrying about this, but we'll never run an ad-supported business again. And Keybase will never sell data. These are our constraints:

Akbar

Akbars Quest: A Work In Progress Mac Os X

Storage

We're giving everyone 250 gigabytes. Our quota model:

  • only the writer's quota is affected when writing in shared dirs. Woo-hoo! So you never have to worry about hurting another's quota or disk space (again: friction). Keybase has to work this way, since it doesn't work on the sync model or require approval before encrypting and sharing with someone.

  • history data does count towards your quota, and you'll soon have controls for how long to keep deleted blocks around.

There is no paid upgrade currently. The 250GB free accounts will stay free, but we'll likely offer paid storage for people who want to store more data.

Performance

We've made no performance optimizations yet. There's a lot of low-hanging fruit.

Iterative releases

Keybase is about to be a full-featured GUI app.

When the Keybase app offers to install an update, we encourage you to accept it. It'll be signed by us.

Public folders of interest

  • /keybase/public/libevent – the popular callback notification library. browse | glossy site
  • /keybase/public/chris - my example folder browse | glossy site

I'll add some people above if they're known authors of popular packages or well-known people. Email me if you've got anything interesting (chris@keybase.io).

Bug reporting

If you encounter a bug of any kind, please run this:

That will (1) package up your logs for us and send them in, and (2) generate a pre-filled github issues page containing an id for your logs.

Business Model?

We're a long way off from worrying about this, but we'll never run an ad-supported business again. And Keybase will never sell data. These are our constraints:

Akbars Quest: A Work In Progress Mac Os 11

  • no ads
  • no selling data
  • we want free, easy public keys for everyone in the world
  • any hosted offerings we have (such as this filesystem) should be free for most
  • 'customers' will be organizations with many users and/or individuals who want disproportionate resources.

Akbars Quest: A Work In Progress Mac Os Catalina

But, as stated above, there is currently no pay model, and we're not trying to make money. We're testing a product right now, and we'd liketo bring public keys to the masses.

Akbars Quest: A Work In Progress Mac Os Download

Links





broken image