PGP (Pretty Good Privacy) is a method of encrypting and signing data (for example an email) in a secure “end to end” way. This means, the message is encrypted on your computer, using the recipient’s public key, in a way that the e-mail server has no knowledge of the content of the message. The recipient of the message then decrypts the message on their own computer using their private key.
OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage. These services include confidentiality, key management, authentication, and digital signatures. This document specifies the message formats used in OpenPGP.
This server is a member of sks-keyserver.net pgp keyserver pools. The main hkp pool which you should configure your pgp software to use is pool.sks-keyservers.net, or perhaps subset.pool.sks-keyservers.net.
The available pools this server is a memeber of are listed below:
More information may be found on the SKS Keyservers Pools Overview Page.
This service may be withdrawn at any time and without notice to end-users. (Peers will be notified). End-users should use a pool definition above, such as pool.sks-keyservers.net which will alias into an operational pool.
Note: This service is provided free, to the public, in the hopes that it might prove useful. No warranty is provided, nor any offer of continuing service or access.
By using this service, you MUST understand that presence of data in the keyserver (pools) in no way connotes trust. Anyone can generate a key, with any name or email address, and upload it. All security and trust comes from evaluating security at the “object level”, via PGP Web-Of-Trust signatures. This keyserver makes it possible to retrieve keys, looking them up via various indices, but the collection of keys in this public pool is KNOWN to contain malicious and fraudulent keys. It is the common expectation of server operators that users understand this and use software which, like all known common OpenPGP implementations, evaluates trust accordingly. This expectation is so common that it is not normally explicitly stated.
The server will return a list of keys matching the search text. The page will have links for every KeyID, and every bracket-delimited identifier (i.e. <firstname.lastname@example.org>). Clicking on the hypertext link will display an ASCII-armored version of the public key.
The search engine is not the same as that used by the pgp program. It will return information for all keys which contain all the words in the search string. A “word” in this context is a string of consecutive alphabetic characters. For example, in the string email@example.com, the words are user, example, and com.
This means that some keys you might not expect will be returned. If there was a key in the database for Marc Edu
This algorithm does not match partial words in any case. So, if you are used to specifying only part of a long name, this will no longer work.
Currently, hypertext links are only generated for the KeyID and for text found between matching brackets. (It is a common convention to put your e-mail address inside brackets somewhere in the key ID string.)
Submitting a pubic key allows other people to find and download the public key.
That is it! The keyserver will process your request immediately. If you like, you can check that your key exists using the extract procedure.
Enter ASCII-armored PGP key here:
Notice: When you submit a key to this server, either via that web interface or via HKP, that key will be migrated around the pool to the different servers in the pool. That key will then be stored on each of those servers in addition to this server. Due to the transferring of keys between servers not managed by a central hosts, deleting a key is not possible at this time. If a key were deleted from this server, other servers in the pool will restore the key in order to maintain a complete collection. This is the servers intended behavior.
Below you will find my list of help files and guides for using PGP on your client and building new key servers.
This site is maintained by Matt Rude (0xc4909ee495b0761f). If you would like to report any problems or bugs, please send a email or XMPP messsage to the email address listed in one of my public keys.
If you are thankful for this service, please consider donating some funds to the cause. My bitcoin address is
You may also see my profile on keybase.io/mattrude.
My Default RSA Key:
uid = Matt Rude pub = rsa2048/95B0761F 2015-03-02 sub = rsa2048/BC158061 2015-03-02 fingerprint = 71FD 20E3 2815 8C32 2133 FBBE C490 9EE4 95B0 761F
My Elliptic Curve Cryptography (ECC) Key:
uid = Matt Rude pub = nistp256/03305F35 2015-02-15 fingerprint = 77F1 D65B 5FF0 54DC 9286 6078 0314 CD85 0330 5F35
curl -s https://keyserver.mattrude.com/contact.txt |gpg --keyserver-options auto-key-retrieve --auto-key-locate pka --verify curl -s https://keyserver.mattrude.com/contact-ecc.txt |gpg --keyserver-options auto-key-retrieve --auto-key-locate pka --verify