Transparency and accountability — verified quarterly.
StormyCloud operates on a simple philosophy: we do not retain logs.
Because we don't retain data, we cannot provide what we don't have.
A signed warrant canary will be published quarterly (January, April, July, and October) to ensure that StormyCloud has not been compromised by any third-party using a subpoena. You can download the warrant and the PGP key.
Hash: SHA256
StormyCloud Inc, January 2026
StormyCloud Inc has not produced any information in response to a
secret subpoena, such as one served under 18 U.S.C. Section 2709(c)
of the U.S. Patriot Act, and has not built "backdoors" for any
government into our products. All government requests for user data
need to come through the front door (i.e., by serving valid legal
process upon StormyCloud).
-----BEGIN PGP MESSAGE-----
iHUEARYIAB0WIQRHv6RMhvlUPNzkuZWLRD9vEHc9FAUCaQaLGwAKCRCLRD9vEHc9
FOQ8AP9CPJKkbPdp/6Bl9F3B8dKcJMO+4GzKATUWdaPfFxPPDQD/dkOGgX8LSMGv
5JjODkJf8qjXQdRcreq5aeTV5pNffwA=
=9bgf
-----END PGP MESSAGE-----Run the following command to download and verify the warrant canary signature:
wget -q http://www.stormycloud.org/files/message.txt.asc -O message.txt.asc && \
wget -q http://www.stormycloud.org/files/public.asc -O public.asc && \
gpg --import public.asc && \
gpg --verify message.txt.asc