Blog

Security Audit Reports: A Guide for Everyone

In 2014, we published our first security audit report. Since then, we have completed more than 200 audits and published more than half of those. The primary audience of an audit report is the client’s project development team. However, stakeholders and other interested parties can also find value in reading

Read More »

Manifest V2 to V3: Challenges and Security Considerations.

We want to alert the community that Manifest V2 extensions that are not already available in the Chrome Web Store will have to be reimplemented in the Manifest V3 extension platform in order to be published.  As of January 2022, the Chrome Web Store stopped accepting new Manifest V2 extensions

Read More »

Celebrating a Milestone: Least Authority’s 100th Security Audit

The Least Authority team reached a notable milestone this month, completing our 100th security audit with the publication of the Clorio Wallet + Mina Ledger JS audit report, funded by the Mina Foundation.   Security audits are a key component of Least Authority’s security consulting services. They represent a significant part

Read More »

Security Consulting FAQs Page is Live

In order to increase the transparency of our processes, we have compiled a list of Frequently Asked Questions for our Security Consulting work. The FAQs page provides details about our services, including: An Overview of Our Services, Planning and Preparing for a Security Audit, Responding to and Managing the Findings.

Read More »

Our Audit of Ethereum Foundation’s Node Discovery Protocol

This summer, Least Authority was hired to audit the Ethereum 2.0 node discovery protocol. We enjoyed diving into the protocol, and found some issues that were really interesting to model and test. Read the full report here.  Proof of Identity The audit went smoothly and we were able to quickly

Read More »
Archives