|Trap and trace orders
|Court order to cease operations
|Coercion, blackmail, or otherwise operating under duress
|Raids with high confidence nothing containing useful data was seized
|Raids with low confidence nothing containing useful data was seized
|The canary can be authenticated to the original source by providing the DOMAIN it will be served at. This is a less secure method of authenticity as anyone with publishing access to the domain can modify the canary.
|Authentication of the canary is done via ECDSA ( Curve25519 ) cryptographic signature of the JSON array by the public key provided inside as the variable PUBKEY.
|The ECDSA ( Curve25519 ) PUBKEY can be a split-key created by n-of-p in order to ensure multiple parties consent to updates of the canary.