CODE | DESCRIPTION | |
war | Warrants | |
gag | Gag orders | |
subp | Subpoenas | |
trap | Trap and trace orders | |
cease | Court order to cease operations | |
duress | Coercion, blackmail, or otherwise operating under duress | |
raid | Raids with high confidence nothing containing useful data was seized | |
seize | Raids with low confidence nothing containing useful data was seized | |
xcred | Compromised credentials | |
xopers | Compromised operations |
LEVEL | DESCRIPTION | |
▖ LOW | The canary can be authenticated to the original source by providing the DOMAIN it will be served at. This is a less secure method of authenticity as anyone with publishing access to the domain can modify the canary. | |
▞ MEDIUM | Authentication of the canary is done via ECDSA ( Curve25519 ) cryptographic signature of the JSON array by the public key provided inside as the variable PUBKEY. | |
▘HIGH | The ECDSA ( Curve25519 ) PUBKEY can be a split-key created by n-of-p in order to ensure multiple parties consent to updates of the canary. |