Warrant canaries are a security industry standard for ensuring our network has not been compromised. https://en.wikipedia.org/wiki/Warrant_canary
Go to file
DarkFeather aacbe044e3
Adding packaging; consistency updates in canary text and verification
2021-01-10 21:42:46 -06:00
hooks Updates to add testing by default; portability fixes 2019-12-07 11:22:09 -06:00
tests Updates to add testing by default; portability fixes 2019-12-07 11:22:09 -06:00
.gitignore Adding packaging; consistency updates in canary text and verification 2021-01-10 21:42:46 -06:00
LICENSE Initial commit 2019-12-06 15:50:28 -06:00
Makefile Adding packaging; consistency updates in canary text and verification 2021-01-10 21:42:46 -06:00
PKGBUILD Adding packaging; consistency updates in canary text and verification 2021-01-10 21:42:46 -06:00
README.md Created warrant_canary and first signature 2019-12-06 17:08:05 -06:00
canary Canary update for 2021-01-10 2021-01-10 21:41:11 -06:00
canary.asc Canary update for 2021-01-10 2021-01-10 21:41:11 -06:00
warrant_canary Adding packaging; consistency updates in canary text and verification 2021-01-10 21:42:46 -06:00

README.md

WarrantCanary

Warrant canaries are a security industry standard for ensuring our network has not been compromised. https://en.wikipedia.org/wiki/Warrant_canary

./warrant_canary

Use this script to seed or verify a warrant canary
Usage: ./warrant_canary -V # Verify the AniNIX's warrant canary
       ./warrant_canary -V -k KEY -K KEYSERVER -c CANARY # Verify another warrant canary
       ./warrant_canary -s # Seed a warrant canary.
Add -v to increase verbosity.

./canary.asc

This is the AniNIX's current warrant canary.