Blog

TQ Tezos – TzBTC for Tezos Foundation

Tezos Foundation requested that Least Authority perform a security audit of TzBTC, a BTC-backed token on Tezos. TzBTC enables the compliant issuance of a fully Bitcoin-backed token on the Tezos blockchain while aiming to eradicate the risks of a single-point-of-failure. This is achieved by dividing the various tasks into keyholders

Read More »

Ethereum 2.0 Specifications

The Least Authority team recently completed our audit of the Ethereum 2.0 Specifications. Read our full report here.  Ethereum 2.0 will be a significant network upgrade and is set to take place in 3 distinct phases—Phase 0: Beacon Chain, Phase 1: Shard Chains, and Phase 2: Execution Environments. It is

Read More »

TRON Protocol

TRON has requested that Least Authority perform a security audit of their TRON Protocol, including the following components: TRON Protocol Blockchain-based operating systems that aims to offer scalable, high-availability and high-throughput support that underlies all the decentralized applications in the TRON ecosystem. TRON Virtual Machine (TVM) Allows users to develop

Read More »

MetaMask – Plugin System + LavaMoat

ConsenSys AG has requested that Least Authority perform a security audit of MetaMask, a browser extension that enables interaction with applications built on Ethereum. MetaMask allows users to browse the web and interact with Ethereum applications, sign messages and transactions, and securely manage and store their private keys and assets. 

Read More »

MetaMask – Permissions System + CapNode

ConsenSys AG has requested that Least Authority perform a security audit of MetaMask, a browser extension that enables interaction with applications built on Ethereum. MetaMask allows users to browse the web and interact with Ethereum applications, sign messages and transactions, and securely manage and store their private keys and assets.

Read More »

Ethereum – Node Discovery Protocol

The Ethereum Foundation requested that Least Authority perform a security audit of the next generation Node Discovery Protocol being developed for the Ethereum P2P network stack. The following components were considered in scope:  Node Discovery Protocol v5 – Specification Node Discovery Protocol v5 – Theory Node Discovery Protocol v5 –

Read More »

Nervos Network

Nervos has requested that Least Authority perform a security audit of the Nervos Network, an open source multi-asset, Proof of Work blockchain, featuring a novel consensus scheme called NC-Max. Nervos is a decentralized application network consisting of a layered architecture, including the layer 1 protocol known as CKB (Common Knowledge

Read More »

Ethereum – ProgPoW Algorithm

Ethereum Cat Herders, Ethereum Foundation, and Bitfly have requested that Least Authority perform a security audit of ProgPow, a Programmatic Proof-of-Work (PoW) algorithm to replace Ethash — in order to verify the security of the algorithm and provide clear metrics about its performance. This audit is part of the overall

Read More »
Archives