Cryptographic Warrant Canary
Integrity and independence declaration of the ITYLOS infrastructure.
Monitored threats
The Canary publicly signals the absence of:
- Secret injunction (Gag order)
- De National Security Letter
- Confidential court order
- Known compromise of hardware or software infrastructure
Verification with GPG (CLI)
To verify the cryptographic signature of the document from your terminal:
Canary Limitations
A Warrant Canary is a powerful transparency mechanism.
It does not guarantee the absolute absence of surveillance, but allows publicly signaling the integrity of the service at a given point in time. True security relies on our client-side encryption model.
Public Archival & History
Previous versions of the Warrant Canary can be publicly archived to allow historical verification of service integrity.
- 1er 2026 (Current)
- 1er 2026
- 1er 2026
Independence and sovereignty
ITYLOS adopts a strict approach to cryptographic sovereignty.
Data is encrypted locally and decryption keys never pass through our servers. The Canary complements this model by providing a continuous integrity declaration.
Cryptographic transparency
ITYLOS publishes a set of transparency mechanisms for independent audit:
- Public cryptographic registry (Append-only)
- Verifiable destruction proofs (Ed25519)
- This signed Warrant Canary
Frequently Asked Questions
Understanding the security monitoring mechanism