Install once
One shell command pulls the CLI, links fuze-base, and opens the guided setup.
Keybase-style trust. Terminal-native chat.
Fuze Base gives private teams terminal chat, public identity proofs, encrypted invites, and a hosted discovery layer that never needs your message plaintext or team secret.
09:41colton pricing memo is ready. sending invite now.
09:42sam got it. proof verified, key accepted.
09:42system sam joined routefusion-founders via encrypted key box.
09:43colton no relay tokens. no shared room secret in Slack. finally.
What it does
One shell command pulls the CLI, links fuze-base, and opens the guided setup.
Your device creates a signed account chain, then you attach a public GitHub or domain proof.
Team keys move through encrypted X25519 key boxes, not pasted shared secrets.
Messages are signed locally, encrypted locally, and synced as ciphertext through the server for every member of the team.
Trust model
Server sees: usernames, public account links, public proof metadata, team membership, timestamps, and encrypted payloads.
Server does not need: message plaintext, private device keys, team secrets, or invite plaintext.
Your client owns: signing keys, decrypt keys, local chat history, and whether another identity is trusted.
curl -fsSL https://fuzebase.io/install.sh | sh
fuze-base onboard
fuze-base chat routefusion-founders
Terminal-first today