Blog

Melonport Protocol

Least Authority performed a security audit of  Melonport’s protocol implementation in anticipation of their move to the Ethereum Mainnet. To read the full report including our findings, click here: Report

Read More »

Knot DNS SOS Fund

Least Authority performed a security audit of Knot DNS SOS Fund. To read the full report including our findings, click here: Report

Read More »

GNU libmicrohttpd (MHD) Library

At Least Authority, our mission is to bring verifiable end-to-end security to everyone. As a part of this mission, we provide security consulting services to free and open-source software projects. We recently performed a security audit of the GNU libmicrohttpd (MHD) library, on behalf of Mozilla’s Secure Open Source Fund. Mozilla’s SOS Fund is

Read More »

Ethereum – Incentive Analysis

By Andrew Miller, Brian Warner, Nathan Wilcox, Zooko Wilcox-O’Hearn S4 secure storage service, we also run a security consulting business. We LeastAuthoritarians have extensive experience in security and cryptography, and other companies sometimes hire us to analyze the security of their protocols and software. Our most recent consulting client is Ethereum. Ethereum is

Read More »

GlobaLeaks

Taylor Hornby on June 2, 2014 At Least Authority, our mission is to bring verifiable end-to-end security to everyone. As a part of this mission, we provide security consulting services to free and open-source software projects. We also run a verifiably-secure cloud backup system, S4. In the past, we’ve performed successful security audits of SpiderOak’s

Read More »

Cryptocat

Zooko Wilcox-O’Hearn on April 2, 2014 This is the second post in our series about security audits of Free and Open Source end-to-end encryption software. The first post in the series was about our security audit of SpiderOak’s crypton project. Our mission at LeastAuthority is to bring verifiable end-to-end security to

Read More »

SpiderOak

By Zooko Wilcox-O’Hearn S4 simple secure storage service, we also run a security consulting business. We LeastAuthoritarians have extensive experience in security and cryptography, and other companies pay us to analyze the security of their protocols and software. Almost all of our consulting clients are making Free and Open Source software

Read More »
Archives