Consent Architecture
Consent isn't a checkbox.
GDPR has required this since 2018; EHDS Article 71 made it enforceable last year. Decentralized Key Management is the only architecture that can honor opt-out across institutional boundaries.
Book a 30-minute consent architecture reviewFive regimes converging in a 24-month window
Consent is no longer an organisational nice-to-have. Across Europe and Switzerland, five separate regulatory regimes have made opt-out a hard legal obligation — and each one was drafted independently of the others. They share one feature: they assume the data controller can stop using identifiable data on demand, propagate that stop across every downstream party, and prove it later. Centralized identity infrastructure was never designed for any of those guarantees.
-
EHDS Article 71
In force 26 March 2025
Opt-out as legal right; Article 71(8) forecloses re-identification registers; Recital 54 mandates reversibility.
-
GDPR Art 7(3) + Art 17(2)
In force since 25 May 2018
Withdrawal must be as easy as giving consent; controllers must propagate erasure to every downstream recipient.
-
eIDAS 2.0 Article 5a
In force 20 May 2024; wallets by Q4 2026
Citizen-controlled identity wallets with selective disclosure and unlinkability obligations on relying parties.
-
Swiss FADP / HFG revision
FADP in force 1 September 2023; HFG amendment in consultation
Consent withdrawal duty for secondary research use; explicit prohibition of re-identification of pseudonymised data.
-
German PDSG
In force since 20 October 2020
Patient-controlled access to ePA records; granular opt-out per data category enforceable across providers.
Each one alone is survivable. Together they make centralized-CA architecture insufficient.
The five engineering invariants
Read the five regimes as one engineer would. Strip out the legal language and what remains is a list of five technical invariants the implementing infrastructure has to satisfy. None of these are optional. None of them are negotiated away by reasonable contractual language. Each is named, by clause, in primary law.
Click any (i) for the reasoning · Click to expand diagram
-
Person-scoped identifiers
The identifier the data subject controls must be the trust root, not an identifier issued by a relying party. EHDS Recital 54 and eIDAS 2.0 Article 5a both name this directly: the citizen must be able to act without the controller having to look them up in a separate register. Every architecture that depends on the controller minting and storing the identifier fails here on day one.
-
Verifiable timestamped opt-out
Withdrawal must be a cryptographically signed, timestamped event the regulator (and a future court) can verify without trusting the controller's logs. GDPR Article 7(3) makes this explicit: the controller carries the burden of proof. A row in an internal database is not evidence in any forum where the controller is the defendant.
-
Reversibility without re-identification
Recital 54 of EHDS demands that opt-out remain reversible — the citizen can opt back in — without anyone having to re-identify the underlying records. That requires the opt-out to operate against a credential the subject controls, not against a server-side mapping table. Centralized consent registries fail here structurally.
-
Cross-controller propagation
GDPR Article 17(2) and EHDS Article 71 both require that withdrawal propagate to every downstream recipient. In practice this means the original controller cannot simply update its local row — every party that ever received the data must re-authenticate the authorisation and discover that it has been revoked. Federation can do this only by sharing identifiers, which violates the next invariant.
-
Unlinkability
eIDAS 2.0 Article 5a requires relying parties to be unable to correlate the same citizen across separate transactions without consent. Article 71(8) of EHDS forecloses the centralised cross-organisational identifier that would make federated propagation trivial. The two invariants together — propagate, but don't correlate — are what kills the conventional architectures.
X.509 satisfies zero. Federation satisfies propagation by violating unlinkability. DKMS satisfies all five.
The Article 71(8) trap
The intuitive engineering response to "honor opt-out across the network" is to keep a list of opted-out identifiers — a centrally maintained do-not-process register that every downstream system queries before it touches a record. Article 71(8) of EHDS specifically forbids exactly this construction. The clause prohibits data holders from acquiring or storing additional identification data solely for the purpose of honouring opt-outs.
The reasoning, made explicit in Recital 54, is that the register itself becomes a re-identification database — the very harm the regulation was written to prevent. Once you maintain a list of "people who opted out", you have rebuilt the central honeypot. The structural implication is unavoidable: the opt-out signal has to travel with a credential the subject controls, not in a list the controller maintains.
The DKMS thesis DKMS is the answer
Decentralized Key Management is the first structurally sound foundation for honoring opt-out end-to-end in cross-organisational, post-disclosure, regulator-watched conditions.
(Decentralized Key Management is built on KERI, an open Trust over IP Foundation specification.)
How it works:
- The user's controlling AID is the trust root. Authorisations chain to it cryptographically, not to a controller-issued account.
- Every authorisation is anchored in the AID's Key Event Log (KEL) — an append-only, hash-linked record the subject can prove the state of unilaterally.
- Withdrawal is a key rotation the subject performs themselves. The old key is invalidated; the rotation event is signed and timestamped on the KEL.
- Downstream parties holding stale credentials must re-authenticate against the latest KEL state. The withdrawal propagates by failing closed at every downstream verifier.
Nothing in the protocol requires a central operator. Nothing requires the relying parties to share identifiers. Nothing requires the regulator to trust the controller's logs over the subject's. Each of the five invariants is satisfied by construction, not by audit.
Where DKMS dominates — and where it offers no benefit
Honesty about scope is what makes the thesis defensible. DKMS dominates four conditions: cross-organisational data flows, post-disclosure withdrawal, regulator-watched processing, and adversarial counterparties. Outside those conditions — single-tenant workloads, derivative artefacts like trained ML model weights, backups already taken before withdrawal, and single dishonest counterparties acting alone — DKMS provides forensic detection but not prevention.
Outside the four conditions where DKMS dominates, centralized CMK is rational. Saying so makes the thesis stronger.
Production proof
HIN — Health Info Net — is Switzerland's health-information backbone, connecting hospitals, clinics, and specialist providers across cantonal lines. SEAL, the verifiable email delivery layer Vereign provides inside HIN, is in production today and carries 800,000+ verified messages per month — proof that Vereign already operates production-grade infrastructure inside Swiss healthcare.
Stargate, the Decentralized Key Management runtime that brings the four-step opt-out mechanism described above into operational use, enters early production in June 2026.
Stargate's FHIR layer — the same guarantees applied to clinical record exchange, not just messages — is architectural today. Bringing it to production depends on hospital-side onboarding; the earliest realistic date is September 2026.
Five incidents that prove the structural pattern
- Kaiser Foundation Health Plan — USD 47.5M class-action settlement (2026). Patient-portal data leaked to advertising platforms via embedded tracking pixels. The architecture had no mechanism for the subject to withdraw downstream propagation.
- Sutter Health — USD 21.5M class-action settlement (2026). Same pattern: portal-side third-party tags, no subject-controlled revocation primitive, no way to prove non-processing after the fact.
- NHS National Data Opt-Out (2021) — non-retroactivity admission; the GPDPR programme was delayed because the architecture could not honour withdrawal against data already shared with downstream researchers.
- SingHealth (2018) — 1.5M records breached because patient data lived in a single monolithic database with no patient-cryptographic boundaries. There was nothing for the subject to revoke; there was no key to rotate.
- DigiNotar (2011) — root CA compromise led browsers to distrust every certificate the CA had ever issued. Subjects had zero architectural agency: their identifiers and trust relationships were entirely operator-controlled.
Every centralized incident shares one feature: the user had no architectural agency.
Where to start
If your organisation processes identifiable health, financial, or regulated personal data and is exposed to any of the five regimes above, the next step is a 30-minute architecture review. We map your current consent flow against the five invariants, identify the gaps, and tell you honestly whether DKMS is the right answer for your environment.
Frequently asked
- What does EHDS Article 71 require?
- EHDS Article 71 (in force 26 March 2025) gives every EU citizen the right to opt out of secondary use of identifiable health data. Article 71(8) forbids data holders from acquiring extra identification data solely to honour opt-out — foreclosing centralized "list of opted-out IDs" implementations because the list itself is a forbidden re-identification record. Recital 54 mandates that opt-out be reversible and free-form.
- Why can't a centralized consent registry work?
- Article 71(8) explicitly forbids it. The registry itself becomes a re-identification record — exactly what the regulation was designed to prevent. The structural answer requires subject-controlled identifiers, not a central operator-controlled list.
- Does DKMS guarantee consent enforcement?
- No. DKMS is the first structurally sound foundation for honoring opt-out end-to-end in cross-organisational, post-disclosure, regulator-watched conditions. Outside those conditions — single-tenant workloads, derivatives like ML model weights, backups already taken, single dishonest counterparties — DKMS provides forensic detection but not prevention.
- How does DKMS interoperate with X.509 / S/MIME counterparties?
- Through KERI-anchored S/MIME bridges that allow withdrawal to propagate across X.509-using parties. The bridge anchors the X.509 certificate to a KERI AID; consent withdrawal triggers AID key rotation; downstream X.509 verifiers must re-fetch and re-authenticate.