Blog

What Makes Privacy Possible, and What Produces It?

Privacy depends on more than promises or compliance. This blog explains how policy creates obligations, but system architecture determines outcomes, shaping what data can be collected, linked, or exposed. Why Law Creates Obligations—but Architecture Determines Outcomes Privacy failures are rarely the result of a single mistake. More often, they emerge

Read More »

Anonymous Data in the Age of AI: Hidden Risks and Safer Practices

Data protection laws often do not apply to the lesser-known category of “anonymous data”. There are misleading claims and new risks. Privacy’s Newest Threat It’s no secret that in today’s digital economy, an era in which data is the new oil, entities are collecting, sharing, and analyzing personal information at

Read More »

The Right to Privacy in a Global Legal Context

At Least Authority, we believe that people have a fundamental right to privacy. In a technical context, a “right to privacy” translates into concrete requirements and design principles that ensure users maintain meaningful control over their personal data. Our security consulting work is rooted in this value as we help

Read More »

Building Credibility: Our Industry Alliances, Partnerships, and Recognitions

Forming alliances and joining industry associations allows us to expand our reach as experts in security and privacy. These partnerships signal reliability to clients and provide a platform for joint marketing, knowledge-sharing, and contributing to industry standards, ultimately strengthening our credibility. Our Key Alliances and Their Impact Blockchain Bundesverband – As

Read More »

Building the Zero-Knowledge Community: Engagement, Events, and Advocacy

The zero-knowledge space is rapidly gaining traction as privacy becomes a critical concern due to the daily news of data breaches that expose personal information to malicious actors. With the exponential growth of data collection and the increasing reliance on cloud services and decentralized technologies, individuals and organizations are seeking

Read More »

Human-centered design at Least Authority

Human-centered design is one of the key approaches Least Authority adopts alongside security- and privacy-by-design. Our human-centered design process involves building an understanding of user needs and experiences, while using those learnings to shape design and development goals and iterations. The case studies below provide examples of this approach. The

Read More »

Dark Crystal social backup using Magic Wormhole

The following document is an extract from Magic Crystal, which describes how to leverage social secret sharing with Dark Crystal using Magic Wormhole for identity-less transport without using any Public Key Infrastructure. The document also includes a protocol design for developers wanting to integrate this feature into their application. It

Read More »
Archives