Blog

Conflux Network – VM Module

While Conflux retains full EVM bytecode compatibility in its Ethereum space, the protocol has been extended with collateral‐based storage economics, dual account spaces, and sponsorship mechanics. In this audit, we reviewed Conflux’s VM implementation. Our final audit report was completed on July 31, 2025. To read the full report, including

Read More »

Turning Milestones Into Meaning: The Depth Behind Our Audits

The Credibility Is in the Work All audits are significant in their own ways, but some stand out for their technical complexity, ecosystem influence, or global significance. As we approach the milestone of having completed 300 security audits, we wanted to take a moment to reflect on what this achievement

Read More »

Lightec – zkBTC Circuit + Smart Contracts

We performed a security audit of the zkBTC Circuit Implementation and Smart Contracts. zkBTC Bridge is a native zero‐knowledge proof-based cross‐chain protocol by Lightec that enables Bitcoin holders to convert BTC into an ERC-20 token, $zkBTC, on Ethereum at a 1:1 peg. Our final audit report was completed on June

Read More »

Joey Wallet

Our team performed a security audit of the Joey Wallet’s key management, focusing on the proper implementation of key derivation, management, and storage. Our final audit report was completed on June 6, 2025. To read the full report, including our findings, click here: Report

Read More »

Zcash – Kotlin and Swift Payment URI Prototypes

As the Zcash ecosystem Security Lead, Zcash Community Grants (ZCG) requested that we perform a security audit of the Kotlin and Swift Payment URI Prototypes, a library for processing Zcash Payment URIs, as defined in ZIP-321. The core functionality of this library, which is implemented in Kotlin for Android and in Swift for

Read More »

The Right to Privacy in a Global Legal Context

At Least Authority, we believe that people have a fundamental right to privacy. In a technical context, a “right to privacy” translates into concrete requirements and design principles that ensure users maintain meaningful control over their personal data. Our security consulting work is rooted in this value as we help

Read More »

Zcash – FROST Demo

As the Zcash ecosystem Security Lead, Zcash Community Grants (ZCG) requested that we perform a security audit of the FROST server and client components. The frost-crate is an implementation for a threshold Schnorr signatures scheme called FROST (RFC 9591, [KG20]). The frost-demo allows a user to locally mimic a key generation

Read More »

Advancing zkVMs with Formal Verification

Least Authority has been awarded a grant from the Ethereum Foundation’s Verified zkEVM program to create a comprehensive Lean blueprint for two cryptographic protocols, STIR [ACF+25] and WHIR [ACF+24], which are interactive oracle proofs of proximity (IOPPs) for Reed-Solomon codes. The zkEVM Program is a recent initiative that aims to

Read More »
Archives