Blog

Audit of ProgPoW Algorithm

Ethereum Cat Herders, Ethereum Foundation, and Bitfly have requested that Least Authority perform a security audit of ProgPow, a Programmatic Proof-of-Work (PoW) algorithm to replac Ethash — in order to verify the security of the algorithm and provide clear metrics about its performance. This audit is part of the overall

Read More »

Audit of Blockstack’s Stacks Investor Wallet

Blockstack has requested Least Authority perform a security audit of the Stacks Wallet, in anticipation of an updated release prior to May 15, 2019. The scope of the audit is focused on a major new feature that will be included in the updated release: allowing users to create a software-only

Read More »

Audit of Dead Canaries’ Onion Routed Cloud

The Onion Routed Cloud Project has requested Least Authority perform a security audit of Onion Routed Cloud (ORC), a piece of software designed to support and protect journalists and activists by providing an anonymous, distributed, and censorship resistant cloud.   Our final audit report was completed on April 5th, 2019.

Read More »

Conference Schedule

11:00 – 11:20 Networking, refreshments and morning snacks, welcome message 11:20 – 11:45 Why Privacy Matters Zooko Wilcox (Zcash) 11:45 – 12:15 Inspiring a Movement Rick Falkvinge (Private Internet Access) 12:15 – 13:05 Data Protection Panel Silvan Jongerius (TechGDPR), Florian Glatz (BLOCKCHAIN.LAWYER), Jan Sahl and moderated by Tom Braegelmann (LEVERTON)

Read More »

Code of Conduct for the conference – “Privacy For Everyone”

We are committed to providing a safe, inclusive, welcoming, and harassment-free conference experience for everyone. We have a Code of Conduct that we expect all attendees to adhere to. This Code of Conduct applies to the conference and the networking evening. Harassment and other exclusionary behavior aren’t acceptable. This includes and is not limited to:

Read More »

Introduction to Mix Networks and Anonymous Communication Networks

Anonymous communication networks like the Tor network hide metadata from passive network observers. While the term ‘anonymous’ is used to mean many things, in this context we are speaking in terms of the inability of a network observer or attacker to link actions on a network with its participants [ANONTERMS]. Even

Read More »

Least Authority’s new comic explains Tahoe-LAFS based S4

Least Authority is excited to present a short comic which explains our Tahoe-LAFS based Simple Secure Storage Service (S4) with a simple narrative illustration. It demonstrates how our products/services provide a more secure alternative to popular online services. To learn more, read on. Special thanks to Sam Hester from The 23rd Story for her brilliant illustrations.

Read More »
Archives