Legal & Policy

Warrant Canaries: What They Promise, and Where They've Failed

April 28, 2026 7 min read Haven Team

A warrant canary is a public statement — updated regularly — that a company has not received a secret government demand it cannot legally disclose. When the canary goes silent, the silence speaks for itself. It's a clever workaround for a genuine legal bind. It's also more fragile than most people assume.


The name comes from the mining industry. Coal miners would bring canaries underground: the birds were sensitive to carbon monoxide and would die before concentrations reached dangerous levels for humans. The bird's death was a warning signal — not a communication, but an absence of something that had been present.

The legal mechanism works on the same principle. A company posts a statement — "We have never received a National Security Letter, FISA court order, or gag order requiring us to hand over user data without disclosure." As long as the statement is updated and present, users can infer no such order has arrived. If it disappears or stops updating, they know something has changed — even if the company cannot say what.

This matters because a class of US government legal instruments — National Security Letters and FISA orders in particular — come with mandatory non-disclosure requirements. A company that receives one often cannot tell users, cannot acknowledge the request exists, and cannot challenge it publicly. The canary exploits a legal grey area: the company hasn't said anything; it simply stopped saying something.

The Mechanism in Practice

Most warrant canaries take one of two forms. The simpler form is a transparency report section that includes a line like "number of National Security Letters received: 0." If that number changes — or the line disappears — users are alerted. The more formal version is a signed, regularly updated statement, sometimes with a cryptographic signature from the company's key so that the date and authenticity can be verified independently.

The cryptographic signature matters. A canary without a verifiable timestamp is easy to manipulate — a company under a gag order could simply leave an old signed statement up and claim it was "still current." Proper canaries include the date in the signed message so any gap in updates is visible.

The core legal theory

US courts have generally held that the government can compel you to hand over data and to stay silent about it. What courts have not clearly established is whether the government can compel you to actively lie — to say you haven't received an order when you have. The canary works in that gap: removing a statement is not lying.

It's worth noting that this legal theory has never been conclusively tested in a public case. The canary's validity as a notification mechanism rests on legal reasoning about compelled speech that, as of 2026, remains untested at the appellate level in the US.

Notable Cases Where Canaries Have Died

Several notable warrant canaries have gone silent over the years, and in most cases the companies have never publicly confirmed what happened — which is precisely the point.

Apple included a warrant canary in its first transparency report in 2013, stating it had received zero NSLs. The canary was absent from the next report. Apple has never commented on why.

Lavabit, the encrypted email service used by Edward Snowden, did not have a formal canary — but it did something more dramatic: it shut down entirely in August 2013 rather than comply with a government order it could not disclose. Founder Ladar Levison appeared in court with his hands tied and later described receiving a subpoena for Snowden's SSL private keys, which would have given the government the ability to decrypt all Lavabit users' traffic.

Reddit included a canary in its 2014 transparency report ("As of January 29, 2015, reddit has never received a National Security Letter…"). It was absent from the 2015 report. Reddit's general counsel at the time confirmed in a published interview that the disappearance was intentional and that they could say nothing further.

These cases illustrate the mechanism working as designed: the canary died, users were alerted, and no further information was forthcoming. They also illustrate the limits of what a canary can actually accomplish.

What a Dead Canary Actually Tells You

When a warrant canary goes silent, you know something changed. You do not know:

A dead canary is a binary signal: something happened. It tells you nothing about scope, which may be exactly one user's metadata, or may be a demand for real-time access to infrastructure. Acting on that signal means making a decision with nearly no information.

For most users, the practical question is: should I leave this service when the canary dies? The honest answer is that you're making a risk judgment with incomplete information. The canary's death could signal targeted collection of a single account, or it could signal broad surveillance infrastructure. You can't tell from the signal alone.

Jurisdictional Limits

Warrant canaries are primarily a US mechanism, designed around the specific legal constraints of NSLs and FISA orders. Other jurisdictions have different rules.

Five Eyes countries (US, UK, Canada, Australia, New Zealand) have intelligence-sharing arrangements and varying forms of compelled production with non-disclosure requirements. The UK's Investigatory Powers Act, for example, includes provisions for notices that cannot be disclosed. A canary designed around US law may not capture demands under UK or Australian law.

Switzerland, often cited as privacy-protective, still has compelled disclosure obligations under Swiss law — as the ProtonMail IP-logging case demonstrated. Swiss privacy law protects data from foreign governments but not from Swiss court orders. A Swiss company could have a clean warrant canary under US law while having handed data to Swiss authorities.

A service that operates in multiple jurisdictions cannot provide a single canary that covers all possible legal demands. Most canaries cover only the jurisdiction where the company is incorporated.

The Practical Limits of the Canary Model

Even a well-designed, cryptographically signed, regularly updated canary has structural limits that privacy advocates have recognized for years.

Limitation Why It Matters
Lag time Canaries are typically updated quarterly or annually. A demand received the day after an update may not be signaled for months. Data already collected cannot be recalled.
Not legally established No court has conclusively held that removing a canary is protected speech. A court could theoretically require a company to maintain a false canary.
Service continuity A dead canary tells you something happened. It does not trigger automatic data deletion, account closure, or any protective action on your behalf.
Only covers compelled disclosure A canary says nothing about voluntary data sharing with governments, data broker relationships, or commercial surveillance.
Scope blindness You cannot tell whether a dead canary covers your data specifically or an unrelated user's account.

None of this makes warrant canaries worthless. For users whose threat model includes government surveillance specifically, a monitored canary is one useful signal among several. The mistake is treating it as a guarantee rather than a warning mechanism.

What to Look For Instead

A warrant canary is a legal mechanism that works in a narrow gap between compelled disclosure and compelled deception. For stronger protection, the architecture matters more than any legal statement.

If a service cannot read your data — because keys are derived client-side and never transmitted — then a government order demanding user data hands over ciphertext. The legal demand may succeed; the surveillance may not. This is why end-to-end encryption's actual guarantees matter more than jurisdiction, and why a service's key management architecture tells you more than its privacy policy.

Canaries and encryption are complementary, not substitutes. A service with strong E2E encryption and an active canary is genuinely better positioned than one with only a canary — because even if the canary dies, the data it hands over may be useless without the keys your device holds.

Read canaries as one input. Watch for whether they're cryptographically signed and dated. Know what jurisdiction they cover. And understand that the most meaningful protection against compelled disclosure is an architecture where there's nothing useful to compel.

Try Haven free for 15 days

Encrypted email and chat in one app. No credit card required.

Get Started →