Data protection laws, such as the EU’s General Data Protection Regulation (GDPR), establish a comprehensive framework of individual rights intended to give data subjects greater control over the processing of . . .
Read More
Data protection laws, such as the EU’s General Data Protection Regulation (GDPR), establish a comprehensive framework of individual rights intended to give data subjects greater control over the processing of . . .
Read MorePrivacy depends on more than promises or compliance. This blog explains how policy creates obligations, but system architecture determines outcomes, shaping what data can be collected, linked, or exposed. Why . . .
Read MorePrivacy is often treated as a feature or a promise. Add encryption, write a policy, or comply with a regulation, and privacy is assumed to follow. Our work this past . . .
Read MoreRecently, we encountered a situation that underscored the importance of verifiable transparency. A modified version of one of our audit reports was shared online through an unauthorized link pointing to . . .
Read MoreData protection laws often do not apply to the lesser-known category of “anonymous data”. There are misleading claims and new risks. Privacy’s Newest Threat It’s no secret that in today’s . . .
Read MoreWhat if Privacy Were the Default? Most digital services still require accounts, personal data, and behavioral tracking permissions, even for simple actions. It’s often assumed that convenience depends on identity. . . .
Read MoreDespite the preferences of data protection fundamentalists for minimal disclosure, disclosure obligations are legally required in several areas with the aim of protecting the integrity of the financial system and . . .
Read MoreAll audits are significant in their own ways, but some stand out for their technical complexity, ecosystem influence, or global significance. As we approach the milestone of having completed 300 . . .
Read MoreAt Least Authority, we believe that people have a fundamental right to privacy. In a technical context, a “right to privacy” translates into concrete requirements and design principles that ensure . . .
Read MoreLeast Authority has been awarded a grant from the Ethereum Foundation’s Verified zkEVM program to create a comprehensive Lean blueprint for two cryptographic protocols, STIR [ACF+25] and WHIR [ACF+24], which . . .
Read More