Summary

Are you worried about your personal files getting stolen by hackers?

What Is Canary Tokens?

It works by embedding your file with a special tracking URL that alerts you through email when opened.

man tracking file on laptop with file management overlay

Suri_Studio/Shutterstock

When a hacker opens the file, a hidden link is opened, alerting you to the breach.

Lets begin by visitingCanary Tokens.

Upon visiting the site, you will be greeted by the Canary Token generator.

Canary-Tokens-Generator

After youve filled out the form, clickCreate my Canarytokenand download the ZIP file embedded with a special token.

Ideally, it should be somewhere easily located for the hacker to find.

You may also want to check your spam folder in case Canarytoken Mailer was identified as spam.

Filling up fields in token generator

Alternatively, selectMore info on this token hereto view the incident map.

To solve this problem, youll want to exclude the embedded folder from your regular antivirus scans.

Will Canary Tokens Work if the File Is Transferred to Another gear?

Canary Mailer report

Yes, as long as the tracking URL was visited, you will be alerted about the incident.

As long as the machine is capable of browsing the web, Canary Tokens should work.

Canary Tokens incident location

Fix Windows folder error

Fix FileSystem error

Select exclusion type

Fix Canary Tokens false positives