Blog

BEAM – Mimblewimble Implementation

At the request of BEAM, Least Authority performed a security audit of BEAM’s implementation of the Mimblewimble protocol, written in C++ and uses the Equihash Mining algorithm. Our review followed the launch of Testnet, in which the code was made open source, and preceded the launch of BEAM’s Mainnet. Our team members Ramakrishnan

Read More »

Zcash (3 Parts)

At the request of Zcash Company, the team at Least Authority had the opportunity to provide security consulting services on Zcash’s major 2018 releases. This included auditing Zcashd v1.0.15 (as part of the Sprout 1.0.x series), reviewing and providing feedback on the Overwinter and Sapling Specifications for future implementation, and a security review of the

Read More »

FundRequest – ICO Smart Contracts

Least Authority performed a security audit of the FundRequest’s ICO Smart Contracts for the upcoming ICO on February 12, 2018. To read the full report including our findings, click here: Report

Read More »

OAuth2.0 Server

Mozilla SOS Fund has requested Least Authority perform a security audit of OAuth 2.0 Server. Our final audit report was completed in February 2018. To read the full report, including our findings, click here: Report

Read More »

“Privacy For Everyone” Conference Schedule

11:00 – 11:20 Networking, refreshments and morning snacks, welcome message 11:20 – 11:45 Why Privacy Matters Zooko Wilcox (Zcash) 11:45 – 12:15 Inspiring a Movement Rick Falkvinge (Private Internet Access) 12:15 – 13:05 Data Protection Panel Silvan Jongerius (TechGDPR), Florian Glatz (BLOCKCHAIN.LAWYER), Jan Sahl and moderated by Tom Braegelmann (LEVERTON)

Read More »

Melonport Protocol

Least Authority performed a security audit of  Melonport’s protocol implementation in anticipation of their move to the Ethereum Mainnet. To read the full report including our findings, click here: Report

Read More »

Code of Conduct for the conference – “Privacy For Everyone”

We are committed to providing a safe, inclusive, welcoming, and harassment-free conference experience for everyone. We have a Code of Conduct that we expect all attendees to adhere to. This Code of Conduct applies to the conference and the networking evening. Harassment and other exclusionary behavior aren’t acceptable. This includes and is not limited to:

Read More »
Archives