Research Independence Statement

The framework requires transparency as a constraint property. We practice what we publish. This page is updated monthly to confirm the project's research independence — standard practice for open research. Think of it as a monthly "all clear" confirming the work is the author's honest assessment, not influenced by outside pressure.

CANARY ACTIVE
MORR CANARY February 10, 2026 — Initial Publication As of this date:
1. No government agency has requested or demanded access to MoreRight research data, communications, or source materials.
2. No legal instrument (subpoena, national security letter, court order, gag order) has been served on the MoreRight project or its founder.
3. No law enforcement or intelligence agency has requested modification, suppression, or delay of any MoreRight publication.
4. No entity has offered compensation in exchange for modifying research conclusions, suppressing evidence, or delaying publication.
5. The founder is operating without coercion or duress.
6. All published research reflects the founder's honest assessment of the evidence.
7. All exit conditions remain unmodified from their original published versions.
Hash of this statement (SHA-256): 84f8576e9fde17abf211dd5880d21ba7af03de51a42426e8eb306d234ac4a2a7 Previous canary hash: GENESIS — no prior canary PGP key: canary-pubkey.asc (fingerprint: 3981 BD2C 12CD 73AE 31C3 1ABB DD07 29DD 3EBF 2DA3) Signed canary: 2026-02-10.txt.asc Schedule: Updated 1st of each month. Grace period: 7 days.

How to read this canary

Signal Meaning
All 7 statements present No known interference or pressure
Statement removed That specific condition has changed
Not updated within 7 days of schedule Founder may be unable to update
Page removed entirely Something significant has changed

Why this works: Legal instruments like national security letters can prohibit disclosure — but cannot compel false statements. If a gag order is served, the founder cannot say "I received a gag order" but also cannot continue to say "no legal instrument has been served." The statement simply disappears.

Verification

Each monthly canary is hashed and chained to the previous one, creating a tamper-evident record. The hash chain is anchored alongside the evidence preservation hashes on Verify.

Even if this site is taken down, the canary history is preserved in the git repository and on permanent storage (IPFS/Arweave when activated).

Why bother with all this?

Research that claims to diagnose manipulation should be transparent about its own independence. This is the constraint specification applied to ourselves: you can see our commitments (transparent), they don't change month to month (invariant), and the verification is in your hands (independent).

The research is also preserved across multiple layers (see Verify) so it remains available regardless of what happens to any single platform.