Blog

Human-centered design at Least Authority

Human-centered design is one of the key approaches Least Authority adopts alongside security- and privacy-by-design. Our human-centered design process involves building an understanding of user needs and experiences, while using those learnings to shape design and development goals and iterations. The case studies below provide examples of this approach. The

Read More »

Dark Crystal social backup using Magic Wormhole

The following document is an extract from Magic Crystal, which describes how to leverage social secret sharing with Dark Crystal using Magic Wormhole for identity-less transport without using any Public Key Infrastructure. The document also includes a protocol design for developers wanting to integrate this feature into their application. It

Read More »

Privy to and the Privacy Bill of Rights

Privy To is a series of immersive installations and XR projects first conceived in 2019 and created by Michelle Leddon, with the help of producers Julia Scott-Stevenson and co-sponsored by Least Authority. It was an official selection at the Copenhagen Documentary Film Festival 2021.  In a recent Medium piece titled

Read More »

We’re upgrading Magic Wormhole to Magic Wormhole for All

The Problem Sending a file from one computer to another is common and should be simple, but it can be surprisingly complicated, even in 2020. This simple-yet-complicated user story is illustrated in xkcd comic #949. How should you send a file from your computer to someone else’s computer? What security

Read More »

Why We Need Client-Side Encryption?

Already in 2017, there has been an inordinate number of cybersecurity meltdowns. This complex and constantly evolving range of security threats lead many of us to wonder how we can best protect our data from theft or loss. Many cloud providers advertise their use of end-to-end encryption for security. However, some of the important data breaches in the past have demonstrated that end-to-end encryption may not be enough. What is end-to-end encryption? End to end encryption is a method of…

Read More »
Archives