We are pleased to announce our collaboration with Bugcrowd. Our mission is to support people’s right to privacy through security consulting and building secure solutions. As a leader in the . . .
Read MoreBlog
Multiple steps are involved to ensure a successful collaboration on a planned security consulting engagement. Whether it requires a security audit, limited security evaluation, or security by design consultation, the . . .
Read MoreThe zero-knowledge space is rapidly gaining traction as privacy becomes a critical concern due to the daily news of data breaches that expose personal information to malicious actors. With the . . .
Read MoreIn our previous blog post, Security Audit Reports: A Guide for Everyone, we provided a comprehensive guide on how to read a security audit report. We discussed the various sections . . .
Read MoreIn 2014, we published our first security audit report. Since then, we have completed more than 200 audits and published more than half of those. The primary audience of an . . .
Read MoreIn January, we celebrated the 10-year anniversary of our first ever published security audit report. At the time of our first review, security consulting for privacy-enhancing and distributed technologies was . . .
Read MoreIn Part 1 of this blog, we delved into the constantly changing world of Web3, unveiling the opportunities it presents. In Part 2, we’re continuing this exploration with a focus . . .
Read MoreThis past year, we’ve started investigating new approaches to our security audit reports and recently we’re experimenting with structuring the data to be more usable by additional audiences and systems, . . .
Read MoreIn recent years the Web3 space, known for its innovation and community driven approaches, has witnessed a significant shift in its approach to funding and supporting projects. We have identified . . .
Read MoreOur work is more than a business for us: We see it as an avenue to advance the use of distributed technologies that empower users, especially their ability to control . . .
Read More