Comment by bramhaag
2 hours ago
There is also Keyoxide[1]. The goal is similar to Keybase (online identify proofs), but Keyoxide uses a decentralized approach where the identity proofs are stored on the key themselves.
2 hours ago
There is also Keyoxide[1]. The goal is similar to Keybase (online identify proofs), but Keyoxide uses a decentralized approach where the identity proofs are stored on the key themselves.
No comments yet
Contribute on Hacker News ↗