Blog

Linea – Limitless Prover

Our team performed a security audit of Linea’s Limitless Prover. The zkEVM aims to provide an execution environment equivalent to the Ethereum Virtual Machine (EVM), allowing Ethereum transactions and smart contract executions. The Limitless Prover feature enables proof generation without the need to impose limits due to the underlying arithmetization.

Read More »

Balancing Privacy-Enhancing Technologies and Legal Disclosure Obligations

Despite the preferences of data protection fundamentalists for minimal disclosure, disclosure obligations are legally required in several areas with the aim of protecting the integrity of the financial system and ensuring legal and ethical conduct. These include Know Your Customer (KYC) processes, beneficial ownership reporting, sanctions compliance, and tax reporting.

Read More »

Chia Network – Permuto

Chia Network has requested that Least Authority perform security audits of Permuto. Permuto consists of certificates issued by the Trust, which is formed solely to hold a single class of stock in a specified publicly traded company, with the first being shares of the common stock of Microsoft Corporation (NASDAQ:

Read More »

Turning Milestones Into Meaning: The Depth Behind Our Audits

The Credibility Is in the Work All audits are significant in their own ways, but some stand out for their technical complexity, ecosystem influence, or global significance. As we approach the milestone of having completed 300 security audits, we wanted to take a moment to reflect on what this achievement

Read More »

Lightec – zkBTC Circuit + Smart Contracts

We performed a security audit of the zkBTC Circuit Implementation and Smart Contracts. zkBTC Bridge is a native zero‐knowledge proof-based cross‐chain protocol by Lightec that enables Bitcoin holders to convert BTC into an ERC-20 token, $zkBTC, on Ethereum at a 1:1 peg. Our final audit report was completed on June

Read More »

Joey Wallet

Our team performed a security audit of the Joey Wallet’s key management, focusing on the proper implementation of key derivation, management, and storage. Our final audit report was completed on June 6, 2025. To read the full report, including our findings, click here: Report

Read More »

The Right to Privacy in a Global Legal Context

At Least Authority, we believe that people have a fundamental right to privacy. In a technical context, a “right to privacy” translates into concrete requirements and design principles that ensure users maintain meaningful control over their personal data. Our security consulting work is rooted in this value as we help

Read More »

Zcash – FROST Demo

As the Zcash ecosystem Security Lead, Zcash Community Grants (ZCG) requested that we perform a security audit of the FROST server and client components. The frost-crate is an implementation for a threshold Schnorr signatures scheme called FROST (RFC 9591, [KG20]). The frost-demo allows a user to locally mimic a key generation

Read More »
Archives