Blog

Navigating the Audit Process: Client Engagement and Technical Methodology

In today’s rapidly evolving tech landscape, ensuring robust security is more than a checklist—it’s a collaborative journey. At Least Authority, our process begins by working closely with our client to define the audit scope and secure the essential documentation and resources. Through in-depth technical discussions, we pinpoint key concerns and

Read More »

Exploring AI-Assisted Security Audits

Can Artificial Intelligence Be Integrated Into Our Workflow? At Least Authority, we are always exploring innovative ways to enhance our security auditing processes and improve our ability to identify vulnerabilities. One area of particular interest is the usefulness of various Artificial Intelligence (AI) models and how they can be integrated

Read More »

Strengthening Crypto Security via MiCA Compliance

Background The newly adopted European Union (EU) Regulation on Markets in Crypto-Assets (MiCA Regulation) aims to provide a unified framework to regulate crypto-asset markets. Crypto-assets are defined in the MiCA Regulation very broadly as ”a digital representation of a value or of a right that is able to be transferred

Read More »

Announcing a New Collaboration With Bugcrowd

We are pleased to announce our collaboration with Bugcrowd.  Our mission is to support people’s right to privacy through security consulting and building secure solutions. As a leader in the security of distributed systems, we offer consulting services, develop privacy-enhancing solutions, and contribute to the advancement of related open source

Read More »

Building the Zero-Knowledge Community: Engagement, Events, and Advocacy

The zero-knowledge space is rapidly gaining traction as privacy becomes a critical concern due to the daily news of data breaches that expose personal information to malicious actors. With the exponential growth of data collection and the increasing reliance on cloud services and decentralized technologies, individuals and organizations are seeking

Read More »

Security Audit Reports: A Guide for Everyone

In 2014, we published our first security audit report. Since then, we have completed more than 200 audits and published more than half of those. The primary audience of an audit report is the client’s project development team. However, stakeholders and other interested parties can also find value in reading

Read More »
Archives