Posted by Wingless in AskRamble (edited )

My understanding of a "warrant canary" is the courts allegedly have a scheme where they don't hesitate to ban you from saying you're being used for government spying, but they supposedly don't quite work themselves up to punishing you for not saying you're NOT under scrutiny. But the key point is that you have to be omitting some AFFIRMATIVE action. I don't think "watch for removal of this notice" will work because they'd say the act of removing it is exactly the same as going out to the press and making a full statement.

4

Comments

You must log in or register to comment.

Rambler wrote (edited )

For those curious: https://en.wikipedia.org/wiki/Warrant_canary and /w/warrant_canary

Good question, and it wasn't created with any sort of legal consultation to be fair.

I guess January's notice my have different phrasing that that goes along the lines of, "Be aware of any prolonged period of no updates to this notice" or something. The goal is to update it monthly however. I guess one could be placed under legal order to continue to update it, I'm not certain as I've yet to see a case where that has been required.

I'm not going to be at the keyboard at the strike of midnight at the beginning of every new month, however, if (for example) it's January 4th and I've:

  • Been active on the site still
  • Haven't updated it yet.

Then there is the possibility it slipped my mind ( I have a reminder set, though ) or, y'know. It's working as intended and not updated on purpose.

With that said I want everyone to understand what is even available if a request was made, which is shockingly little. Can't share what we don't know. One of the benefits of the end-user accessing this site through the various network is this:

  • Tor traffic looks like localhost traffic. (Same local IP for everyone)
  • Lokinet traffic looks like localhost traffic (Different local IP as Tor, but still local and the same for everyone)
  • I2P traffic is all logged as the IP address from the I2P router that the HTTP tunnel is created on, regardless of user, the IP is the same. I'm not going to pretend like I know enough about the network to tell you how I can not determine the difference between I2PUser_A and I2PUser_B, but like the above networks, I can't tell the difference between them as far as logs go.
  • Yggdrasil is a bit different and not necessarily as anonymous as the above methods however you should be able to browse with different Yggdrasil IPs as set by the end-user.
  • The clearnet is obviously the least private of all the above and I encourage use of the alternative networks where able.

The inability to diffrentiate between User_A and User_B while using the anonymity networks is one of the reasons why I've stated that in the event of severe abuse stemming from any particular network, I'll close access to that network (temporarily) to prevent it.

If anyone is concerned about their privacy, my suggestions are to:

  • Use a unique username that isn't used elsewhere.
  • Use a unique password that isn't used elsewhere. That's just always good practice regardless of what you're doing or what you're signing up for.
  • Don't use an email address, because you don't have to and I don't want to send you email anyway.
  • Assess your OPSec needs and if you know you're doing stuff outside of the eye of the law then do all of the above and also don't post stuff that would make it easier to pinpoint you. Basically, don't copy/paste content you posted under a different alias elsewhere, I'd refrain from mentioning things that can pinpoint you to any specific geographical location, etc.

IF YOU EVER FEEL LIKE YOUR OPSEC HAS BEEN COMPROMISED OR YOU NEED OR WANT TO START FRESH

  • Click your name in the top right corner.
  • Go to "My Account"
  • Click, "Delete This Account"

That will delete all your posts, submissions, votes, everything. We do run backups of this site and without giving away too much because it's really not the public's business, in a matter of a short period any available backup that had any of that information stored will be overwritten a newer backup, one that doesn't contain that info. Backups are for when I inevitably mess something up by mistake and need to recover from it without much (hopefully) data loss.

2