The warrant canary is a monthly attestation that Sign has not, as of the date below, received a legally-binding request that would compromise customer trust in our receipts or audit log. If the canary disappears or stops updating, treat it as a signal: something happened that we were compelled to stay silent about.
authority_rotate. Re-issued on the 1st of each month. Next update: 2026-05-01.
Some legal regimes (FISA orders, National Security Letters) prohibit the recipient from disclosing that they received the order. They don't prohibit the recipient from stopping to affirm that they haven't received one. A canary reverses the default: we continuously affirm the negative, and the absence of that affirmation itself becomes the signal.
This is a hedge, not a guarantee. A legally sophisticated adversary could demand we keep lying with canary updates. The canary is one layer among many — it pairs with Sign's public audit log, authority pubkey pinning, and offline receipt verification. All four must be compromised simultaneously for an attacker to forge receipts undetectably.
/v1/audit/verify, that's a second independent signal.This canary covers Zoza Sign only. Separate canaries exist for:
Cross-product compromise (one canary flipping while others stay green) would itself be a signal.
Canary discipline: updated monthly, signed by the current Sign authority key, head hash anchored to that calendar month. Automated re-signing is explicitly avoided — each canary requires a human-reviewed action to preserve the signal.