Blog

Chia Network – Permuto

Chia Network has requested that Least Authority perform security audits of Permuto. Permuto consists of certificates issued by the Trust, which is formed solely to hold a single class of stock in a specified publicly traded company, with the first being shares of the common stock of Microsoft Corporation (NASDAQ:

Read More »

Conflux Network – VM Module

While Conflux retains full EVM bytecode compatibility in its Ethereum space, the protocol has been extended with collateral‐based storage economics, dual account spaces, and sponsorship mechanics. In this audit, we reviewed Conflux’s VM implementation. Our final audit report was completed on July 31, 2025. To read the full report, including

Read More »

Turning Milestones Into Meaning: The Depth Behind Our Audits

The Credibility Is in the Work All audits are significant in their own ways, but some stand out for their technical complexity, ecosystem influence, or global significance. As we approach the milestone of having completed 300 security audits, we wanted to take a moment to reflect on what this achievement

Read More »

Lightec – zkBTC Circuit + Smart Contracts

We performed a security audit of the zkBTC Circuit Implementation and Smart Contracts. zkBTC Bridge is a native zero‐knowledge proof-based cross‐chain protocol by Lightec that enables Bitcoin holders to convert BTC into an ERC-20 token, $zkBTC, on Ethereum at a 1:1 peg. Our final audit report was completed on June

Read More »

Joey Wallet

Our team performed a security audit of the Joey Wallet’s key management, focusing on the proper implementation of key derivation, management, and storage. Our final audit report was completed on June 6, 2025. To read the full report, including our findings, click here: Report

Read More »

Zcash – Kotlin and Swift Payment URI Prototypes

As the Zcash ecosystem Security Lead, Zcash Community Grants (ZCG) requested that we perform a security audit of the Kotlin and Swift Payment URI Prototypes, a library for processing Zcash Payment URIs, as defined in ZIP-321. The core functionality of this library, which is implemented in Kotlin for Android and in Swift for

Read More »

The Right to Privacy in a Global Legal Context

At Least Authority, we believe that people have a fundamental right to privacy. In a technical context, a “right to privacy” translates into concrete requirements and design principles that ensure users maintain meaningful control over their personal data. Our security consulting work is rooted in this value as we help

Read More »

Zcash – FROST Demo

As the Zcash ecosystem Security Lead, Zcash Community Grants (ZCG) requested that we perform a security audit of the FROST server and client components. The frost-crate is an implementation for a threshold Schnorr signatures scheme called FROST (RFC 9591, [KG20]). The frost-demo allows a user to locally mimic a key generation

Read More »
Archives