Last updated: 15 April 2026
Janus Security publishes this warrant canary as a statement of transparency. This page will be updated monthly. If this page is not updated for 60 days, or if any of the statements below are removed, assume that the corresponding event has occurred.
As of the date of this update, Janus Security confirms the following:
- We have NOT received any National Security Letters (NSLs)
- We have NOT received any orders under the Foreign Intelligence Surveillance Act (FISA)
- We have NOT received any court orders requiring disclosure of user data
- We have NOT been subject to any gag orders preventing disclosure of government requests
- We have NOT placed any backdoors in our hardware or software
- We have NOT provided any user data, encryption keys, or device access to any government agency
- We have NOT been compelled to modify our systems to allow government surveillance
- We have NOT received any classified requests for user information from any jurisdiction
Our infrastructure is designed so that even under compulsion, we physically cannot access user data. RAM-only VPN servers retain no logs. End-to-end encryption means we never hold plaintext. Device encryption keys exist only on the device itself.
DOCUMENT ID: JAN-WC-2026-04-15
SIGNED: Janus Security Team
NEXT UPDATE: 15 May 2026
VERIFICATION: PGP-signed copy available on request via SimpleX or Signal
What is a warrant canary? A warrant canary is a method by which a service provider can inform users that it has NOT been served with a secret government subpoena. If the canary statement is removed or not updated, users should assume that the provider has received such a request and may be prohibited from disclosing it directly.