Every month, a Zoza officer signs a statement confirming Zoza Auth has received no secret subpoenas, National Security Letters, RBI gag-orders, CERT-In compelled-assistance orders, or any other legal process that compels us to impersonate a user, forge a challenge, weaken the Curve25519 parameters, or hand over customer data without informing the customer bank. The statement is signed with our offline canary key and pinned below. If the statement stops being updated, or changes substantively, draw your own conclusion.
On 2026-04-17, I, the signing officer for Zoza Auth, state the following is true for the period 2026-03-18 through 2026-04-17:
We have during this period responded to 0 law-enforcement data requests within scope of our 90-day metadata retention (challenge IDs, app IDs, timestamps). Scope-of-request totals will be published quarterly on this page — never as a surprise.
Signed using the Zoza Auth offline canary key (fingerprint below). Verified by any party with our published public key.
2026-04-17T00:00:00Zauth-canary-ed25519: TO BE PUBLISHED ON FIRST SIGNINGA gag-order from RBI, CERT-In, or an equivalent authority can legally compel us to comply and forbid us from saying so. We cannot lie about the compulsion directly — but we can refuse to re-sign a statement that says "we have not been compelled", because doing so would make the lie itself illegal. So: if the monthly signing stops, the most truthful reading is that compulsion has occurred.
If you build on Zoza Auth for a high-risk integration (banking, gov, healthcare), we recommend scripting a monthly fetch of this page + signature verification. Integration example lives at /developers/auth.html#canary-script.
# 1. Fetch the signed statement curl https://zoza.world/about/auth-canary.txt -o canary.txt # 2. Fetch the public key curl https://zoza.world/about/auth-canary-pubkey.hex -o pubkey.hex # 3. Fetch the detached signature curl https://zoza.world/about/auth-canary.sig -o canary.sig # 4. Verify (requires ed25519 CLI) ed25519-verify --pubkey pubkey.hex --msg canary.txt --sig canary.sig # → "OK" if the canary is authentic
First publication of the signed files + public key: launch day. Until then this page is hand-published and the ed25519 signing key is being generated under offline ceremony.
Each canary signature commits to the previous canary's hash — a silent-swap of an earlier statement breaks every later one. Once published, a canary cannot be quietly revised.