Canary Statement

noun

1… A small songbird in the finch family, serinus canaria domestica, originally native to islands in the North Atlantic.

2… A mechanism to test for unsafe conditions, originating from the use of canaries in coal mines to detect poisonous gases or cave-ins. If the canary died, it was time to get out of the mine. More recently, the term has been used by some online service providers to refer to an affirmative statement, updated regularly, that the provider has not been subjected to certain legal processes. If the statement is not updated in a timely fashion, users may infer that the canary statement may no longer be true.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

As of March 31, 2015 [1], riseup has not received any National Security Letters or FISA court orders, and we have not been subject to any gag order by a FISA court, or any other similar court of any government. Riseup has never placed any backdoors in our hardware or software and has not received any requests to do so. Riseup has never disclosed any user communications to any third party.

Regarding server seizures, in a widely-reported incident [2], the FBI seized one of riseup's servers in April 2012. This incident happened in New York. The machine was encrypted and contained no user data. The server was returned, but it was not placed back in service. Other than this incident, as of March 31, 2015 riseup confirms that it has never had any hardware seized or taken by any third party.

Riseup intends to update this report approximately once per quarter.

[1] https://firstlook.org/theintercept/2015/03/31/obama-lifts-freeze-weapons-transfer-egyptian-dictator/
[2] https://www.eff.org/deeplinks/2012/04/may-firstriseup-server-seizure-fbi-overreaches-yet-again
[3] There is no footnote three, but since you looked, you should read this too: https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess/
-----BEGIN PGP SIGNATURE-----
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=8xQR
-----END PGP SIGNATURE-----

Verification instructions

You should follow these instructions to download riseup’s gpg key and verify the keyid. Then you may follow these steps to verify this statement:

  1. Download the signed canary statement
  2. Then run this command in a terminal:
    gpg --verify canary-statement-signed.txt
  3. You should get output that says:

pre..
gpg: Signature made Tue 31 Mar 2015 08:22:06 PM PDT
gpg: using RSA key 0×3043E2B7139A768E
gpg: Good signature from “Riseup Networks <collective@riseup.net>”

You should make sure that it says “Good signature” in the output and confirm that the keyid matches the one you verified here earlier. If this text has been altered, then this information should not be trusted.