![]() When using Slack for asynchronous communication, there are some basic rules to keep the exchange efficient and respectful of everyone’s time.Do not tag people if their immediate attention is not required.Favor long-form messages with a clear context and a detailed thought or question (several short messages, even in a thread, will be more disrupting and difficult to follow).Clearly state that an immediate response is not required.Explicitly mention a date by which you need to get a response.Keybase is our secondary tool for both internal and external chat communication.Īs all communication is securely encrypted on Keybase, we primarily use it to send credentials such as username/passwords, API keys/secrets to our team members but also to external stakeholders.Ĭredentials are permanently stored on 1Password. So only resort to Keybase to send personal credentials that cannot be stored on 1Password. Line is our tertiary tool exclusively used for internal and out-of-office chat communication. While Slack offers video calls, the team predominantly uses Google Meet for all internal meetings: Google Meet is our primary tool for both internal and external video-based communication. ![]() When it comes to video calls with external parties, Google Meet is also always used when Nimble is the host. The main use cases are job interviews and client meetings. ![]() However, the team often uses other tools such as Zoom or Microsoft Teams when the external party is the host for the calls. Therefore, our teammates must ensure to have these tools set up. EmailĮvery teammate has a company email on Google Workspace. To maintain consistency between all email signatures, and to ensure that they all look good, we have designed an email signature template.A serious flaw in Zoom’s Keybase secure chat application left copies of images contained in secure communications on Keybase users’ computers after they were supposedly deleted. The flaw in the encrypted messaging application ( CVE-2021-23827 ) does not expose Keybase users to remote compromise. However, it could put their security, privacy and safety at risk, especially for users living under authoritarian regimes in which apps like Keybase and Signal are increasingly relied on as a way to conduct conversations out of earshot of law enforcement or security services. The flaw was discovered by researchers from the group Sakura Samurai as part of a bug bounty program offered by Zoom, which acquired Keybase in May, 2020. Zoom said it has fixed the flaw in the latest versions of its software for Windows, macOS and Linux.Īccording to researcher John Jackson of Sakura Samurai, the Keybase flaw manifested itself in two ways. First: Jackson discovered that images that were copy and pasted into Keybase chats were not reliably deleted from a temporary folder, /uploadtemps, associated with the client application.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |