The following signed statement positively confirms the integrity of our system: all our infrastructure is under our control, we have not been compromised or suffered a data breach, we have not disclosed any private encryption keys, and we have not been forced to modify our system to allow access or information leakage to any government or third party.

Here you can verify that our service is safe to be used and your data remains confidential, an outdated message and invalid signature or an empty statement could mean that our service integrity has been compromised.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

NiceVPS confirms that our service IS SAFE to be used normally and has not received any undemocratic court order or secret subpoena.

This statement will be updated approximately on the following dates:
* February 1
* May 1
* August 1
* November 1

$ Last update date: 5 February 2020

We will include two links to recent news articles [0-1] in each update to establish that the signature is current as of today.
    
##### Comments or remarks #####
No comments or remarks till today
###############################

0. https://www.vice.com/en_us/article/9393w7/this-man-created-traffic-jams-on-google-maps-using-a-red-wagon-full-of-phones
1. https://uk.reuters.com/article/uk-vodafone-outlook-huawei-tech/vodafone-will-remove-huawei-from-its-core-networks-idUKKBN1ZZ0WN

-----BEGIN PGP SIGNATURE-----
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=FiyB
-----END PGP SIGNATURE-----

How to verify?

You should follow these instructions in order to verify the above statement:

  1. Download and import our PGP/GPG key from https://nicevps.net/index/pgp or run command:
    gpg --keyserver pool.sks-keyservers.net --recv-key 0x173CECFE9F89D843C47462474E06EBA9C2F37F75
  2. Download the signed canary statement (save it as canary.txt)
  3. Then run this command in a terminal or verify from a GUI:
    gpg --keyserver-options auto-key-retrieve --verify canary.txt
  4. You should get a positive output message like "Good signature from "NiceVPS <our_email>" and verify that the key id and fingerprint matches:
    Fingerprint: 173CECFE9F89D843C47462474E06EBA9C2F37F75
    Key-ID: C2F37F75

If this text has been altered, then the signature will fail to verify and the statement should not be trusted (but it is not an ultimate proof).

Note that if the statement is outdated, verification failed or simply does not appear you should proceed with caution as our service may not be able to protect you as before.