Melonport Protocol
Least Authority performed a security audit of Melonport’s protocol implementation in anticipation of their move to the Ethereum Mainnet. To read the full report including our findings, click here: Report
Least Authority performed a security audit of Melonport’s protocol implementation in anticipation of their move to the Ethereum Mainnet. To read the full report including our findings, click here: Report
Least Authority performed a security audit of Knot DNS SOS Fund. To read the full report including our findings, click here: Report
At Least Authority, our mission is to bring verifiable end-to-end security to everyone. As a part of this mission, we provide security consulting services to free and open-source software projects. We recently performed a security audit of the GNU libmicrohttpd (MHD) library, on behalf of Mozilla’s Secure Open Source Fund. Mozilla’s SOS Fund is
By Andrew Miller, Brian Warner, Nathan Wilcox, Zooko Wilcox-O’Hearn S4 secure storage service, we also run a security consulting business. We LeastAuthoritarians have extensive experience in security and cryptography, and other companies sometimes hire us to analyze the security of their protocols and software. Our most recent consulting client is Ethereum. Ethereum is
Taylor Hornby on June 2, 2014 At Least Authority, our mission is to bring verifiable end-to-end security to everyone. As a part of this mission, we provide security consulting services to free and open-source software projects. We also run a verifiably-secure cloud backup system, S4. In the past, we’ve performed successful security audits of SpiderOak’s
Zooko Wilcox-O’Hearn on April 2, 2014 This is the second post in our series about security audits of Free and Open Source end-to-end encryption software. The first post in the series was about our security audit of SpiderOak’s crypton project. Our mission at LeastAuthority is to bring verifiable end-to-end security to
By Zooko Wilcox-O’Hearn S4 simple secure storage service, we also run a security consulting business. We LeastAuthoritarians have extensive experience in security and cryptography, and other companies pay us to analyze the security of their protocols and software. Almost all of our consulting clients are making Free and Open Source software