Privacy Policy

How we protect your data and encryption practices

End-to-End Encryption

All communications and data storage on Keybase use state-of-the-art encryption methods. Our protocol implementsers maintain FIPS 140-2 compliant cryptographic modules for data at rest and in transit.

Minimal Data Storage

We store only the essential metadata required to operate our service. All user-generated content is encrypted before transmission and not accessible to Keybase staff.

Zero-Knowledge Architecture

Our system design ensures we cannot access your encryption keys. All decryption keys remain on your personal devices using hardware-level security features.

Legal Compliance

✔️

GDPR Compliant

Conforms to EU data protection regulations

✔️

CCPA Compliant

Supports CA Consumer Privacy Rights

✔️

ISO 27001

Information Security Certified

User Privacy Controls

Key Management

Control your encryption keys and rotation policies

Session Control

View and terminate active sessions across devices

Data Export

Download your data or request permanent deletion

How to Submit a Request

  1. 1. Log into your Keybase profile
  2. 2. Navigate to the privacy settings
  3. 3. Select the type of request
  4. 4. Follow the verification steps
  5. 5. Confirm your identity through your registered keys

Contact for Privacy Matters

For any privacy-related inquiries or data requests, please contact our dedicated support team through the official Keybase contact portal.

Contact Page