End-to-End Encryption
All communications and data storage on Keybase use state-of-the-art encryption methods. Our protocol implementsers maintain FIPS 140-2 compliant cryptographic modules for data at rest and in transit.
Minimal Data Storage
We store only the essential metadata required to operate our service. All user-generated content is encrypted before transmission and not accessible to Keybase staff.
Zero-Knowledge Architecture
Our system design ensures we cannot access your encryption keys. All decryption keys remain on your personal devices using hardware-level security features.
Legal Compliance
GDPR Compliant
Conforms to EU data protection regulations
CCPA Compliant
Supports CA Consumer Privacy Rights
ISO 27001
Information Security Certified
User Privacy Controls
Key Management
Control your encryption keys and rotation policies
Session Control
View and terminate active sessions across devices
Data Export
Download your data or request permanent deletion
How to Submit a Request
- 1. Log into your Keybase profile
- 2. Navigate to the privacy settings
- 3. Select the type of request
- 4. Follow the verification steps
- 5. Confirm your identity through your registered keys
Contact for Privacy Matters
For any privacy-related inquiries or data requests, please contact our dedicated support team through the official Keybase contact portal.
Contact Page