StormyCloud operates on a simple philosophy: we do not retain logs.
Because we don’t retain data, we cannot provide what we don’t have.
A signed warrant canary will be published quarterly (January, April, July, and October) to ensure that StormyCloud has not been compromised by any third-party using a subpoena. You can download the warrant and the PGP key.
Hash: SHA256 StormyCloud Inc, October 2025 StormyCloud Inc has not produced any information in response to a secret subpoena, such as one served under 18 U.S.C. Section 2709(c) of the U.S. Patriot Act, and has not built "backdoors" for any government into our products. All government requests for user data need to come through the front door (i.e., by serving valid legal process upon StormyCloud). -----BEGIN PGP MESSAGE----- iHUEARYIAB0WIQRHv6RMhvlUPNzkuZWLRD9vEHc9FAUCaQaLGwAKCRCLRD9vEHc9 FOQ8AP9CPJKkbPdp/6Bl9F3B8dKcJMO+4GzKATUWdaPfFxPPDQD/dkOGgX8LSMGv 5JjODkJf8qjXQdRcreq5aeTV5pNffwA= =9bgf -----END PGP MESSAGE-----
bash wget -q http://www.stormycloud.org/warrant-canary/message.txt.asc -O message.txt.asc && wget -q http://www.stormycloud.org/warrant-canary/public.asc -O public.asc && gpg --import public.asc && gpg --verify message.txt.asc