http://keybas3nmhbh3bhasixeb7a2t55in7gdp4hhm5oesmfcsvql6nrkekid.onion/blog/keybase-joins-zoom
Securing the communications Keybase has spent the last six years publishing tech to solve public key infrastructure. The crypto-devil is in these kinds of details: How do you know a server gave you the right keys? Is there some "trust on first use" (a.k.a TOFU)? If so, what happens when someone upgrades a device?