Blog

Blockstack – Stacks Investor Wallet

Blockstack has requested Least Authority perform a security audit of the Stacks Wallet, in anticipation of an updated release prior to May 15, 2019. The scope of the audit is focused on a major new feature that will be included in the updated release: allowing users to create a software-only

Read More »

MetaMask – Mobile App

Least Authority conducted a security audit of the MetaMask mobile application, a wallet and developer tool for applications built on Ethereum. MetaMask allows users to browse the web and interact with Ethereum applications, sign messages and transactions, and securely manage and store their private keys and assets. The mobile application is built in React Native within a single codebase for both iOS and Android platforms. MetaMask previously built and released a web extension providing the…

Read More »

Dead Canaries – Onion Routed Cloud

The Onion Routed Cloud Project has requested Least Authority perform a security audit of Onion Routed Cloud (ORC), a piece of software designed to support and protect journalists and activists by providing an anonymous, distributed, and censorship resistant cloud.   Our final audit report was completed on April 5th, 2019.

Read More »

Tezos Protocol (5 Parts)

We are happy to release the results of the five security audits that Least Authority performed in 2018 for the Tezos Foundation, a Swiss non-profit organization that supports Tezos, a distributed, peer-to-peer, permissionless network, and the community around it. This series of security audits were done as part of the Tezos Foundation’s

Read More »

Cosmos – Blockchain SDK Framework

Least Authority performed a security audit of the Cosmos Blockchain SDK, a framework for building Proof of Stake state machines. The investigation and analysis were conducted by Emery Rose  Hall and Ramakrishnan Muthukrishnan, along with project management support by Hind Abu-Amr, in collaboration with Tendermint team members Jessy Irwin, Zaki Manian,

Read More »

BEAM – Mimblewimble Implementation

At the request of BEAM, Least Authority performed a security audit of BEAM’s implementation of the Mimblewimble protocol, written in C++ and uses the Equihash Mining algorithm. Our review followed the launch of Testnet, in which the code was made open source, and preceded the launch of BEAM’s Mainnet. Our team members Ramakrishnan

Read More »

Zcash (3 Parts)

At the request of Zcash Company, the team at Least Authority had the opportunity to provide security consulting services on Zcash’s major 2018 releases. This included auditing Zcashd v1.0.15 (as part of the Sprout 1.0.x series), reviewing and providing feedback on the Overwinter and Sapling Specifications for future implementation, and a security review of the

Read More »

FundRequest – ICO Smart Contracts

Least Authority performed a security audit of the FundRequest’s ICO Smart Contracts for the upcoming ICO on February 12, 2018. To read the full report including our findings, click here: Report

Read More »
Archives