Highlights

Blog

Search
The blog title Enhance Your Understanding: An annotated Security Audit Report on a blue and white background banner.

In our previous blog post, Security Audit Reports: A Guide for Everyone, we provided a comprehensive guide on how to read a security audit report. We discussed the various sections . . .

Read More

In 2014, we published our first security audit report. Since then, we have completed more than 200 audits and published more than half of those. The primary audience of an . . .

Read More

In January, we celebrated the 10-year anniversary of our first ever published security audit report. At the time of our first review, security consulting for privacy-enhancing and distributed technologies was . . .

Read More

In Part 1 of this blog, we delved into the constantly changing world of Web3, unveiling the opportunities it presents. In Part 2, we’re continuing this exploration with a focus . . .

Read More

This past year, we’ve started investigating new approaches to our security audit reports and recently we’re experimenting with structuring the data to be more usable by additional audiences and systems, . . .

Read More

In recent years the Web3 space, known for its innovation and community driven approaches, has witnessed a significant shift in its approach to funding and supporting projects. We have identified . . .

Read More

Our work is more than a business for us: We see it as an avenue to advance the use of distributed technologies that empower users, especially their ability to control . . .

Read More

The belief that everyone has a right of privacy, including data privacy, is the base of all the work that we do at Least Authority. Key aspects of building privacy . . .

Read More

Over the last few years we’ve been expanding our Ecosystem Support by including various Security Consulting offerings to meet the needs of the different ecosystems with which we are working. . . .

Read More

Through our work, we have the opportunity to speak with various people in the FinTech, Cybersecurity, and Web3 fields. Recently, one pattern emerged: there is increasing interest in advanced cryptography . . .

Read More

Videos