Thanks :)
I’m not aware of any sites tracking our warrant canaries, but there are standards for machine-readable warrant canaries to make this easier
Edit: oh, it looks like the EFF, Calyx Institute, Freedom of the Press Foundation, NYU Law, the Berkman Center, and a few other orgs run a service that monitors warrant canaries called Canary Watch
This update from 2016 says they were monitoring 70 org’s canaries
Edit 2: oh, looks like they silently shut it down some years ago :( well, we adopted the autocanary standard from FLM linked-above, so it shouldn’t be hard for some canary observatory to consume and track our canaries.
Do you have any tips on soldering solutions that would allow us to decrease the size?
Unfortunately, it’s already extremely difficult to solder the pins and glue the magnets at the current size. I think it’s important to lower the barrier of entry for people with just basic soldering and printing tools to be able to make this. But if you have any recommendations to shrink the size without also making it impossible for most hackers to build themselves, we’re all ears :)
fwiw, we do have an injection molded version that’s much smaller, but it requires very expensive equipment to make (which is one reason we’re developing this 3D-printable version as an alternative)
Yep :) You can see the full Bill of Materials here:
The benefit of the magnetic breakaway is that it works at any angle, which is a reduced risk in certain theft scenarios. In any case, we have a guide on how you can build one yourself here:
I doubt frying the motherboard would have any impact on the irrecoverability of the data on the disk. If you want to do this properly, we have an anti-forensics “self-destruct” trigger that wipes the FDE (encryption keys from the) LUKS header:
Thanks for catching this :) The domain was missing.
We updated the article; it should be working now
Yes. For more information about the demographic of users, see the documentation:
We’ve had solutions to the “laptop stolen when unlocked” problems for years. BusKill uses a cable that you clip to your belt for this. It’s simple. You don’t need to film your employees all day long to solve this problem.
If the connection between you to your computer is severed, then your device will lock, shutdown, or shred its encryption keys – thus keeping your encrypted data safe from thieves that steal your device.