Index Options:
Index type:


What is PGP?

PGP (Pretty Good Privacy) is a method of encrypting and signing data (for example an email) in a secure “end to end” way. This means, the message is encrypted on your computer, using the recipient’s public key, in a way that the e-mail server has no knowledge of the content of the message. The recipient of the message then decrypts the message on their own computer using their private key.

OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage. These services include confidentiality, key management, authentication, and digital signatures. This document specifies the message formats used in OpenPGP.

PGP Resources

About the Server Pool

This server is a member of pgp keyserver pools. The main hkp pool which you should configure your pgp software to use is, or perhaps

The available pools this server is a memeber of are listed below:

More information may be found on the SKS Keyservers Pools Overview Page.

About this Service

This service may be withdrawn at any time and without notice to end-users. (Peers will be notified). End-users should use a pool definition above, such as which will alias into an operational pool.

Note: This service is provided free, to the public, in the hopes that it might prove useful. No warranty is provided, nor any offer of continuing service or access.

By using this service, you MUST understand that presence of data in the keyserver (pools) in no way connotes trust. Anyone can generate a key, with any name or email address, and upload it. All security and trust comes from evaluating security at the “object level”, via PGP Web-Of-Trust signatures. This keyserver makes it possible to retrieve keys, looking them up via various indices, but the collection of keys in this public pool is KNOWN to contain malicious and fraudulent keys. It is the common expectation of server operators that users understand this and use software which, like all known common OpenPGP implementations, evaluates trust accordingly. This expectation is so common that it is not normally explicitly stated.

Extracting Keys

How-to extract a key

Index Options:
Index type:

Extraction caveats

The search engine is not the same as that used by the pgp program. It will return information for all keys which contain all the words in the search string. A “word” in this context is a string of consecutive alphabetic characters. For example, in the string, the words are user, example, and com.

This means that some keys you might not expect will be returned. If there was a key in the database for Marc Edu , this would be returned for by the above query. If you do not want to see all these extra matches, you can select "Only return exact matches", and only keys containing the specified search string will be returned.

This algorithm does not match partial words in any case. So, if you are used to specifying only part of a long name, this will no longer work.

Currently, hypertext links are only generated for the KeyID and for text found between matching brackets. (It is a common convention to put your e-mail address inside brackets somewhere in the key ID string.)

Submitting Keys

Submitting a public key allows other people to find and download the public key.

How-to submit a key

  1. Cut-and-paste an ASCII-armored version of your public key into the text box.
  2. Press Submit Public Key.

That is it! The keyserver will process your request immediately. If you like, you can check that your key exists using the extract procedure.

Submit a key to the pool

Enter ASCII-armored PGP key here:


External Guides

What is PGP and why should I use it?

Installed PGP Client Software

Webmail PGP Clients


Contact Information

This site is maintained by Matt Rude (0x94c32ac158aea35c). If you would like to report any problems or bugs, please send a email or XMPP messsage to the email address listed in one of my public keys.

My Public PGP Key Information

My Default Key:

pub   ed25519 2019-03-05 [SC] [expires: 2024-03-03]
      1B99 1052 9DF4 FE1F E3C6  B037 94C3 2AC1 58AE A35C
uid   Matt Rude 
sub   cv25519 2019-03-05 [E] [expires: 2024-03-03]

Or, you may validate my keys using one of my DANE or PKA DNS records or via WKD.