http://keybase5btp2qikoau6u326pvotn47gb55mo6fjxxyxdoywiinomr5id.onion/blog/keybase-new-key-model
In the above example, the first 2 words ("death punch") are a public label,
and the rest encodes the private key. here we see a user with 4 computers (2 are mobile) and 6 keys; she even used her paper key to provision a device! the important thing is that she is herself, the sum of all her proofs, on any device Paper keys, like devices, must be publicly announced and are publicly removed.