Blog

Meet Fritz, the POLA bear: Our mascot.

Fritz on March 24, 2017 Hello, my name is Fritz, the POLA bear. I’m the mascot of Least Authority TFA GmbH, and this is my story. In November 2016 – at about the same time when Least Authority TFA GmbH was founded – a polar bear was born in the sprawling Tierpark

Read More »

Least Authority Performs Incentive Analysis For Ethereum

By Andrew Miller, Brian Warner, Nathan Wilcox, Zooko Wilcox-O’Hearn S4 secure storage service, we also run a security consulting business. We LeastAuthoritarians have extensive experience in security and cryptography, and other companies sometimes hire us to analyze the security of their protocols and software. Our most recent consulting client is Ethereum. Ethereum is

Read More »

Privacy Technologies for Bitcoin

By the Zerocash Team, Greg Maxwell, and Least Authority Introduction The world still needs Zerocash even though we now have Confidential Transactions. A message from Zooko Wilcox-O’Hearn: At Least Authority, our mission is to bring verifiable end-to-end security to every user of the Internet. As a part of this mission, we are working on something

Read More »

A Bug in libsnark

Zooko Wilcox-O’Hearn, Alessandro Chiesa, Eli Ben-Sasson, Eran Tromer, Madars Virza on May 16, 2015 A statement from Least Authority Zooko Wilcox-O’Hearn writing: About us At Least Authority, some of the security audits that we’ve performed on behalf of others, and here is a contest we organized for others to find security flaws in our

Read More »

Least Authority Performs Security Audit of GlobaLeaks

Taylor Hornby on June 2, 2014 At Least Authority, our mission is to bring verifiable end-to-end security to everyone. As a part of this mission, we provide security consulting services to free and open-source software projects. We also run a verifiably-secure cloud backup system, S4. In the past, we’ve performed successful security audits of SpiderOak’s

Read More »

Least Authority Performs Security Audit For Cryptocat

Zooko Wilcox-O’Hearn on April 2, 2014 This is the second post in our series about security audits of Free and Open Source end-to-end encryption software. The first post in the series was about our security audit of SpiderOak’s crypton project. Our mission at LeastAuthority is to bring verifiable end-to-end security to

Read More »

BLAKE2: “Harder, Better, Faster, Stronger” Than MD5

Zooko Wilcox-O’Hearn on March 21, 2014 Best read while listening to Daft Punk: Harder, Better, Faster, Stronger Why use BLAKE2 instead of Skein, Keccak (SHA-3), MD5, or SHA-1 as a secure hash function? BLAKE was the best-rated hash function in the SHA-3 competition NIST, in the final report of the SHA-3 competition, said this about

Read More »
Archives