Audit of TRON Protocol

TRON has requested that Least Authority perform a security audit of their TRON Protocol, including the following components: TRON Protocol Blockchain-based operating systems that aims to offer scalable, high-availability and high-throughput support that underlies all the decentralized applications in the TRON ecosystem. TRON Virtual Machine (TVM) Allows users to develop decentralized applications (DAPPs) for themselves …

Read moreAudit of TRON Protocol

Project Update: Tahoe-LAFS for Human Rights Defenders

This summer, Least Authority has been wrapping up our project funded by the Open Technology Fund (OTF) to make Tahoe-LAFS a more usable tool for human rights organizations. (Read about the background on this project in our earlier post.) While secure file storage is a necessity for most everyone, human rights defenders have a more …

Read moreProject Update: Tahoe-LAFS for Human Rights Defenders

Audit of Band Protocol’s Cosmos-SDK Oracle Module

Band Protocol has requested that Least Authority perform a security audit of the BandChain Cosmos-SDKoracle module in the BandChain chain directory. Bandchain is a Decentralized Data Delivery Network(D3N) built on Cosmos-SDK. BandChain aims to connect public blockchains with off-chain informationand aims to achieve the following design goals: Speed and Scalability: The system must be able …

Read moreAudit of Band Protocol’s Cosmos-SDK Oracle Module

We’re upgrading Magic Wormhole to Magic Wormhole for All

The Problem Sending a file from one computer to another is common and should be simple, but it can be surprisingly complicated, even in 2020. This simple-yet-complicated user story is illustrated in xkcd comic #949. How should you send a file from your computer to someone else’s computer? What security and privacy concerns should be …

Read moreWe’re upgrading Magic Wormhole to Magic Wormhole for All

We’re Hiring

Technical Writer We’re looking for a technical writer to assist our team writing reports on security research and audits, open source technical documentation, project status reports, whitepapers, user guides, and privacy analysis statements on various technical approaches. The work involves deep dives into the technical aspects of our projects with the objective of organizing and …

Read moreWe’re Hiring