-
-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support other key hosts beyond github #5
Comments
also re: github key use crypto, see this issue https://github.com/substack/cipherhub/issues/2 (we are using for signing and not encrypting) |
would having a lot of keys impact performance? |
@reqshark no. it just uses the first public key that matches a local private key |
what about keybase? |
@guybrush did you read the first message in this thread? |
@maxogden lol sorry, somehow i did miss the last sentence or something was pretty late for me haha |
right now we use github because: https://github.com/maxogden.keys
but we should be able to use any scheme where you can type a username and it can figure out how to get a public key. it should probably prompt the user and double check that they wanna trust the public key from the domain it resolves, similar to what keybase does.
keybase might be a good next one to support actually, as they have a CORS enabled endpoint to get the pgp key for any user
The text was updated successfully, but these errors were encountered: