Warrant Canary

Existing and proposed laws, especially as those related to the US Patriot Act, dictate the authority to issue secret warrants, searches and seizures of data from online users. These laws can cause criminal penalties for revealing the warrant, search or seizure, disallowing disclosure related to these events that would negatively affect both the users of a VPN service and SlickVPN.com. The principals and employees of SlickVPN must comply with such warrants and their provisions for secrecy.

Due to these circumstances, SlickVPN stands prepared and will make available, on a tri-monthly basis, a “warrant canary” in the form of a cryptographically signed message containing the following:

A declaration that states, up to the stated point of time, no warrants have been served, nor have any searches or seizures taken place. This will also include a pasted headline from a selected major news source, establishing and as a verification on the true date of issue. Special note should be taken if these messages ever cease being updated or are unchanged for more than ninety (90) days, or are removed from this page.

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

As of March 29th, 2024, SlickVPN.com, Slick Networks, Inc., Slick Network, LTD., (“SlickVPN”) has not received any National Security Letters or FISA court orders, and we have not been subject to any gag order(s) by a FISA court, or any other similar court(s) of any government. SlickVPN has never placed any backdoors in our hardware or software and has not received any requests to do so. SlickVPN has never disclosed any user communications to any third party. No searches or seizures of any kind have ever been performed on SlickVPN assets.

Recent headlines:

US offers $10M to help catch hackers – https://techcrunch.com/2024/03/28/state-department-10-million-change-healthcare-hackers/

Sam Bankman-Fried Sentenced to 25 Years in Prison – https://www.usnews.com/news/best-states/new-york/articles/2024-03-28/dethroned-crypto-king-sam-bankman-fried-to-be-sentenced-for-defrauding-ftx-investors

—–BEGIN PGP SIGNATURE—–

iQEzBAEBCgAdFiEE/bVXuR7Yj+4bZdgmvCW01obfY1gFAmDwdNgACgkQvCW01obf
Y1g9lwf7BCZbQ33Z+BUsNvI9c0r0gftjbWWix1Y6dTdQZMAHdiP0JCT80xztwt1W
QIQluDel9BUsGbWTyAIdyvyqk8D9URypwZFxS68TmstDaBZGzfiRpiESy3qJZmav
QqxHiBvp9hgtokhT8l7vuEU9V/NSkQQk55H2IgtADdZHnN9WJK/BTlqUO/yJLNsQ
lnHhtxAfeX8iWgbrXdoV+ebLgqKis0mlg8WTo6CYmSivNkDe9tJJIlf4FnzH1+a0
J8jzIx0otSQ47PvxZySNV7lMhIXRBSL9gREcQyOHeKoH7cAoFTe9lRaQuarwjnfG
0QE0bO3cjNOQRv3AMse6sPqVl87a/A==
=wtHf
—–END PGP SIGNATURE—–

 

Verification:

Warning: this process is pretty technical, it requires familiarity with OpenPGP and the command-line. It assumes you have the program gpg installed.

Import SlickVPN’s OpenPGP key

On the terminal, import SlickVPN’s public OpenPGP key from a keyserver:

$ gpg --keyserver keys.gnupg.net --recv-key BA1EAEB0
$ gpg2 --fingerprint BA1EAEB0

The first line will import the key into your keyring, but there is no guarantee that you actually imported the right key. The ” –fingerprint” command allows you to see the fingerprint of the key and actually confirm you imported the correct key. You should see an output that contains the following information:

Key fingerprint = 74FA 4FB8 3586 6246 6827 7F72 0738 ACDA BA1E AEB0

There is no particular reason that you should trust this key on its own. Instead, you can verify and authenticate the key by those who have confirmed and verified the key:

gpg --list-sigs BA1EAEB0

Verify SlickVPN’s Certificate

Now that you have imported SlickVPN’s public key, you can verify that the fingerprints listed on this page are really from SlickVPN.com.

Copy and paste the above statement and save it to a text file named:  SlickVPN_Canary_message.asc

Then run this command in a terminal:

gpg --verify SlickVPN_Canary_message.asc

You should get output that says:

gpg: Good signature from "SlickVPN Team"

You should make sure that it says “Good signature” in the output! If this text has been altered, then this information should not be trusted. Unless you have taken explicit steps to build a trust path to the SlickVPN Collective key, you will see a warning message similar to:

gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.

However, you still should see the “Good signature”.

Compare the fingerprints

Now that you verified that the above message contains the fingerprints for our certificate, you can compare this value to the value provided by your browser. In most browsers, to find the fingerprint of the certificate your browser sees you can click on the lock icon located in the location bar. This should bring up details about the certificate being used, including the fingerprint.

If the values match, and you trust the SlickVPN public OpenPGP key, then you can be confident you are really communicating with SlickVPN.com servers.

SlickVPN VPN Warranty Canary Implemented

SlickVPN has implemented a “Warrant Canary” system that allow users to check cryptograhically signed messages posted each month to confirm that no warrants or seizures have been served to SlickVPN.
The Warrant Canary provides a declaration that no searches, seizures or warrants were issued by government officials on any user, employee or the SlickVPN company.
Additionally, SlickVPN has never placed any backdoors or hidden elements that would allow outside access to our servers.
SlickVPN is consistent in establishing our transparency with our customers to ensure the features of privacy and security are always placed first in our priorities.

CANARY STATEMENT

Existing and proposed laws, especially as those related to the US Patriot Act, dictate the authority to issue secret warrants, searches and seizures of data from online users. These laws can cause criminal penalties for revealing the warrant, search or seizure, disallowing disclosure related to these events that would negatively affect both the users of a VPN service and SlickVPN.com. The principals and employees of SlickVPN must comply with such warrants and their provisions for secrecy.

Due to these circumstances, SlickVPN stands prepared and will make available, on a bi-weekly basis, a “warrant canary” in the form of a cryptographically signed message containing the following:

A declaration that states, up to the stated point of time, no warrants have been served, nor have any searches or seizures taken place. This will also include a pasted headline from a selected major news source, establishing and as a verification on the true date of issue. Special note should be taken if these messages ever cease being updated or are unchanged for more than fourteen (14) days, or are removed from this page.

 

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

As of May 6th, 2016, SlickVPN.com, Slick Networks, Inc., Slick Network, LTD., (“SlickVPN”) has not received any National Security Letters or FISA court orders, and we have not been subject to any gag order(s) by a FISA court, or any other similar court(s) of any government. SlickVPN has never placed any backdoors in our hardware or software and has not received any requests to do so. SlickVPN has never disclosed any user communications to any third party.  No searches or seizures of any kind have ever been performed on SlickVPN assets.

Recent headlines:

Star Wars’ most iconic vehicles – http://www.bbc.com/autos/story/20160503-star-wars-most-iconic-vehicles-illustrated

Coast Guard helps rescue man after 2 months adrift in Pacific – http://www.cnn.com/2016/05/05/politics/pacific-rescue-after-two-months-at-sea/index.html
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBAgAGBQJXLPpFAAoJEAc4rNq6Hq6wLoUH/2Tfk0xQoVu9VRkRqiZ7F0db
TO0UwcgiJgsQommx/gOldGKtH4Q9PwAwT8PRPAYU8oGjkwg2noad48n+PeGi3MFx
fvmIRra3dvMqRyD3OnFOjByKR7K6X9KgPDGUJ55JFoWHPxjYqTB9kh4J+c62gule
sP1JlMcBVFjl6YtWbqW7QpPQf42Et3rBmalXj3aEzCSijDmUyfaBTn7jrTe+ViZl
G3JOn9JEfGzYtWDFfmhurS/my0u60FQwcl+o0rX76ZSk9+Q+W06zo1od7+44JqLd
58XaKsMuV5ZAgDuaIqGSn5FLxC3E6RKcmU3xOtO4u323TWp1C3iRBx2LnOnj5CU=
=SzFM
—–END PGP SIGNATURE—–

 

Verification:

Warning: this process is pretty technical, it requires familiarity with OpenPGP and the command-line. It assumes you have the program gpg installed.

 

Import SlickVPN’s OpenPGP key

On the terminal, import SlickVPN’s public OpenPGP key from a keyserver:

$ gpg --keyserver keys.gnupg.net --recv-key BA1EAEB0
$ gpg2 --fingerprint BA1EAEB0

The first line will import the key into your keyring, but there is no guarantee that you actually imported the right key. The ” –fingerprint” command allows you to see the fingerprint of the key and actually confirm you imported the correct key. You should see an output that contains the following information:

Key fingerprint = 74FA 4FB8 3586 6246 6827 7F72 0738 ACDA BA1E AEB0

There is no particular reason that you should trust this key on its own. Instead, you can verify and authenticate the key by those who have confirmed and verified the key:

gpg --list-sigs BA1EAEB0

Verify SlickVPN’s Certificate

Now that you have imported SlickVPN’s public key, you can verify that the fingerprints listed on this page are really from SlickVPN.com.

Copy and paste the above statement and save it to a text file named:  SlickVPN_Canary_message.asc

Then run this command in a terminal:

gpg --verify SlickVPN_Canary_message.asc

 

You should get output that says:

gpg: Good signature from "SlickVPN Team"

You should make sure that it says “Good signature” in the output! If this text has been altered, then this information should not be trusted. Unless you have taken explicit steps to build a trust path to the SlickVPN Collective key, you will see a warning message similar to:

gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.

However, you still should see the “Good signature”.

Compare the fingerprints

Now that you verified that the above message contains the fingerprints for our certificate, you can compare this value to the value provided by your browser. In most browsers, to find the fingerprint of the certificate your browser sees you can click on the lock icon located in the location bar. This should bring up details about the certificate being used, including the fingerprint.

If the values match, and you trust the SlickVPN public OpenPGP key, then you can be confident you are really communicating with SlickVPN.com servers.

Guides

What Is Kodi?

Online Security Threats

Warrant Canary

Personal Devices Travel & Protecting Your Identity

How to Know When Your VPN Provider Is Being Honest

Five Great Reasons to Use SlickVPN with Netflix

SlickVPN Reseller Program

Want to Start Your Own VPN Business?

9_resizeStarting a successful business is more than just recognizing a need and fulfilling it—but that is a great place to start. With today’s connected world, online security is big business, and is predicted to grow to 155 billion by 2019.   Privacy concerns and consumers who want to surf the web anonymously– accessing the content they want in complete privacy– have contributed to the skyrocketing growth of the use of VPNs, or Virtual Private Networks.

VPN service provides an encrypted tunnel for communications, and an IP address that cannot be traced back to the user.  In short, online activities cannot be monitored, throttled, or buffered.

Not surprisingly, the same country that is in the news for their economic growth is also heavily into VPN:  Chinese citizens seeking to get around the government’s “Great Firewall” of China have embraced the technology, with more than 90 million Chinese using VPN to simply access social network sites.

VPN is Big Business—for Business

It’s not just consumers using VPN.  With information being precious for business, it was natural that VPN technology started in the corporate world back in the 1990s.  Today 91% of respondents said that VPNs are the main form of security for controlling network access.  It’s tried and true technology.

Want to Break in to the VPN Provider Business?

Understanding how VPNs work is fairly simple:  A secure tunnel is created between the chosen device the consumer is using and a server.  Information sent through this encrypted tunnel prevents others from intercepting the communication.  Because the target server will have an IP address different from the user’s, geo-locked content can be accessed, and the user’s IP address cannot be used to pierce their online identity.

But starting your own VPN business will obviously involve a lot more than simply knowing how the VPN works.  You’ll have all the typical business start-up needs, plus more decisions unique to this industry:

  • Which VPN protocols will you offer?
    • There are several, all with differing layers of security and ease of use: SSL (Secure Socket Layer); OpenVPN; PPTP; IPsec; L2TP
    • Remember, a static IP address will need to be used for a VPN to work effectively
    • Also remember that Windows supports only PPTP and L2TP/IPsec protocols
  • With how many servers will you contract?
  • Remember that maintenance of your VPN service will be vital to ensuring it remains secure
  • Mobile options become increasingly important for VPN users, so you’ll need to offer those
  • Will your VPN business keep logs?
  • Will you offer a warrant canary?

Yes, there is much to consider.  But there’s also a much easier, faster way to get into the growing VPN industry today.

You can launch your own VPN service as a white label reseller of SlickVPN, rated one of the best VPNs available by BestVPN.com.  SlickVPN is valued by its members for protecting their privacy with super-strong encryption.  SlickVPN is the VPN service that allows customers to control their own internet experience with attractive features to attract those customers:

  • World’s Fastest VPN
  • Zero Logs. Zero.
  • Anonymous Torrenting
  • Unlimited Bandwidth
  • Choice of protocols, including Unlimited P2P traffic
  • Guaranteed Protection
  • Servers in over 142 cities
  • 30 day Money Back Guarantee

As a SlickVPN reseller, you will be given everything you need to launch your own high quality VPN service.  You can brand and build your service however you like, resting assured that you are offering your customers the fastest and most reliable VPN service around.  And you don’t have to invest the time and capital to build the service model yourself!

You buy in bulk from SlickVPN at extremely attractive white label pricing, and with your newfound economy of scale, resell at a profit anywhere you wish.

Quick Entry Into the Market

As a white-label reseller, you can focus all your time and effort on marketing and sales of your own VPN business.  You can create your own brand, your own website, and market to customers the way you believe is best.  You can reap big profits in this growing industry without having to worry about your technology backend and software concerns.  The SlickVPN reseller package allows everything you need to be fully customizable.

You’ll get:

  • Windows, Mac, and mobile software to rebrand
  • Various access plans ready to white label
  • 24/7, 365 access to the SlickVPN reseller control panel
  • Quick and easy setup process with full documentation
  • Customer and technical support
  • Attractive compensation model
  • Billing, provisioning and service support

Interested in getting into a lucrative high-tech business for yourself– but not by yourself?  SlickVPN can make it happen for you today!  Simply click to Contact Us!

Contact Us

  • This field is for validation purposes and should be left unchanged.