Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Harvesting user email addresses without any form of consent is against GDPR regulation #17

Closed
njannink opened this issue Aug 8, 2023 · 3 comments
Labels
bug Something isn't working

Comments

@njannink
Copy link

njannink commented Aug 8, 2023

The SponsorLink addin is sending user email addresses without any consent to a cloud API. When used inside a corporate environment is is unacceptable. Next to this its also against EU GDPR regulations and probably most corporate environments.

Developers won't use their private github account to do contributions to the corporate git repository, so the sponsorlink will never work for them either

@kzu
Copy link
Member

kzu commented Aug 9, 2023

Thanks for your comment!

From the readme in this very repo, perhaps you missed this important note:

NOTE: the actual email is never sent. It's hashed with SHA256, then Base62-encoded. The only moment SponsorLink actually gets your email address, is after you install the SponsorLink GitHub app and give it explicit permission to do so.

We never get the actual email address until the user actually consents to that by installing the SponsorLink app.

@kzu kzu closed this as completed Aug 9, 2023
@iamdavidfrancis
Copy link

@kzu a SHA256 of the email is not sufficient for GDPR compliance:

Personal data which have undergone pseudonymisation, which could be attributed to a natural person by the use of additional information should be considered to be information on an identifiable natural person.

https://www.privacy-regulation.eu/en/recital-26-GDPR.htm

@V0ldek
Copy link

V0ldek commented Aug 9, 2023

The resulting opaque string (which can never reveal the originating email) is the only thing used.
(emph. mine)

This is completely incorrect, and not GDPR compliant.

It's not GDPR compliant due to the paragraph linked by @iamdavidfrancis.

It's trivially exploitable, since you could

  1. scrap all email addresses from all GitHub commits
  2. SHA256-hash them
  3. compare records from SponsorLink with the resulting dictionary

Since you don't use any salt when hashing, this is privacy-unsecure basically by design.

Even if this was somehow legal from the standpoint of GDPR, it's so obviously and blatantly unethical that I can't even believe we need to have this discussion.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

4 participants