Blog

Zcash (3 Parts)

At the request of Zcash Company, the team at Least Authority had the opportunity to provide security consulting services on Zcash’s major 2018 releases. This included auditing Zcashd v1.0.15 (as part of the Sprout 1.0.x series), reviewing and providing feedback on the Overwinter and Sapling Specifications for future implementation, and a security review of the

Read More »

FundRequest – ICO Smart Contracts

Least Authority performed a security audit of the FundRequest’s ICO Smart Contracts for the upcoming ICO on February 12, 2018. To read the full report including our findings, click here: Report

Read More »

OAuth2.0 Server

Mozilla SOS Fund has requested Least Authority perform a security audit of OAuth 2.0 Server. Our final audit report was completed in February 2018. To read the full report, including our findings, click here: Report

Read More »

“Privacy For Everyone” Conference Schedule

11:00 – 11:20 Networking, refreshments and morning snacks, welcome message 11:20 – 11:45 Why Privacy Matters Zooko Wilcox (Zcash) 11:45 – 12:15 Inspiring a Movement Rick Falkvinge (Private Internet Access) 12:15 – 13:05 Data Protection Panel Silvan Jongerius (TechGDPR), Florian Glatz (BLOCKCHAIN.LAWYER), Jan Sahl and moderated by Tom Braegelmann (LEVERTON)

Read More »

Melonport Protocol

Least Authority performed a security audit of  Melonport’s protocol implementation in anticipation of their move to the Ethereum Mainnet. To read the full report including our findings, click here: Report

Read More »

Code of Conduct for the conference – “Privacy For Everyone”

We are committed to providing a safe, inclusive, welcoming, and harassment-free conference experience for everyone. We have a Code of Conduct that we expect all attendees to adhere to. This Code of Conduct applies to the conference and the networking evening. Harassment and other exclusionary behavior aren’t acceptable. This includes and is not limited to:

Read More »

Introduction to Mix Networks and Anonymous Communication Networks

Anonymous communication networks like the Tor network hide metadata from passive network observers. While the term ‘anonymous’ is used to mean many things, in this context we are speaking in terms of the inability of a network observer or attacker to link actions on a network with its participants [ANONTERMS]. Even

Read More »
Archives