Home

Focus On Security

We help projects improve their security and build secure technology.

From prototype to production, we work closely with teams through the complete development cycle to identify security issues and promote best practices. Our consulting services include security audits, design reviews and multi-phase engagements.

Published Audit Reports

ZCash Logo

ZCash
Three Audits

Ethereum
Eth 2.0 Specifications

Blockstack
Stack Investor Wallet

MetaMask
Mobile App

Tezos
Five Audits

Privacy By Design

At Least Authority, we believe in peoples’ right to privacy and are on a mission to make secure technology easy and accessible to everyone. We build technical solutions that incorporate these values and help technologies to be more secure.

PrivateStorage (formerly S4)

PrivateStorage is a joint venture product developed and maintained by Least Authority and Private Internet Access. As firm believers in protection of our customers’ privacy, we joined efforts to offer a private, secure and end-to-end encrypted solution to allow the end user — not third-parties — to determine whether and to what extent the personal data on the storage service is collected, shared, and processed.

Tahoe LAFS

A free and open, secure, decentralized, fault-tolerant, distributed data store and distributed file system. It can be used as an online backup system, or to serve as a file or Web host similar to Freenet, depending on the front-end used to insert and access files in the Tahoe system.

ZKAPs

Zero Knowledge Access Passes attempt to solve the issue of privacy-preserving payments. This anonymous, token-based authorization protocol based on Privacy Pass for use PrivateStorage helps facilitate an online exchange of value while disconnecting the payment and service data that is gathered on customers.

Magic Wormhole

Get things from one computer to another, safely. Magic Wormhole, created by developer Brian Warner, is a clever way to send files easily and securely.

The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and do not need to be memorized.