Reply to post:

Things that make you go hmmm: Do crypto key servers violate GDPR?

Crypto Monad Silver badge

> consent requires a "clear affirmative action" by the data subject

Uploading your key to a keyserver and requesting it to be published is pretty clear affirmative action.

The problem is when someone else uploads your key without your permission - or worse, a different key which claims to be yours.

That is why I don't use keyservers: anyone can upload any random key with any random label. There's no assurance it's the right one, unless (a) I got the fingerprint from a trusted source (in which case I could have got the key from that source too); or (b) the key happens to be signed by someone in my web-of-trust, which is pretty small.

Therefore, in general I get keys directly from whoever I'm corresponding with: it's much easier to make a value judgement over whether it's the right key or not.

Back to GDPR: there is an assumption baked into PGP that public keys are, well, public. Simple answer: get rid of keyservers. These days you can publish OpenPGP keys securely in DNS/DANE instead.

One other thing: can anyone give me a good reason why a keyserver should *not* remove a key on request, if the request is signed by that key?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon