31 August 2018
Paul and I are building Fluidkeys, software that helps teams protect themselves with strong encryption.
This week’s been a short one. 🏝 Paul’s on holiday. Meanwhile I’ve:
We’re starting to build Fluidkeys by focusing on security conscious developers and sysadmins. We think we can make something that helps them get their teams using strong encryption. Therefore our first release will be an application they’ll run from the terminal. We imagine they’ll use this to get setup, then start inviting other members of their team to install it.
Last week, Paul introduced two personas that were helpful in sketching out how this could work at a high level.
While he’s been off in France, I’ve taken this thinking a little further and began writing some example commands they could run and the accompanying output they’d receive. You can take a look here.
➜ ~ fk Start with a key locker ==== In Fluidkeys, everything starts with a locker. This is the place you and others in your organisation place their keys for safe keeping. Is your group already using Fluidkeys? 1. Find your Fluidkeys locker 🔎 2. Create a new locker ✨ [1/2] : _ Creating a new locker \... [done] We'll now store your key in the new locker and set you up as an adminsitrator Found GnuPGP, would you like to import an existing key from there? [Y/n] _
All of these are very early doodles, but I think we’ll find them useful next week as we start to work up the interface for this release.
Meanwhile, we’ve also made keys generated using Fluidkeys expire in 60 days. Later we’ll implement some sort of key rotation, but I found getting this working useful for improving my understanding of how Go’s openpgp library works. 🕵️♂️
Despite being on holiday, I’ve seen Paul is pushing the odd work in progress commit to git… He’s been dabbling with making it so each time you generate a key with Fluidkeys you also automatically create a revocation certificate and this gets zipped as part of your backup.
We also opened a joint bank account in under 3 days. Rapid. Well done Monzo.
Thanks for reading.