Blog

BEAM – Mimblewimble Implementation

At the request of BEAM, Least Authority performed a security audit of BEAM’s implementation of the Mimblewimble protocol, written in C++ and uses the Equihash Mining algorithm. Our review followed the launch of Testnet, in which the code was made open source, and preceded the launch of BEAM’s Mainnet. Our team members Ramakrishnan

Read More »

Zcash (3 Parts)

At the request of Zcash Company, the team at Least Authority had the opportunity to provide security consulting services on Zcash’s major 2018 releases. This included auditing Zcashd v1.0.15 (as part of the Sprout 1.0.x series), reviewing and providing feedback on the Overwinter and Sapling Specifications for future implementation, and a security review of the

Read More »

Least Authority performs Security Audit of Knot DNS and Knot Resolver on behalf of Mozilla’s “SOS” Fund

Earlier this year, Least Authority completed a security audit of Knot DNS and the Knot Resolver for the Mozilla Secure Open Source (“SOS”) Fund. The Mozilla SOS Fund provides security auditing, remediation, and verification for key open source software projects. This Fund is part of the Mozilla Open Source Support program (MOSS) which recognizes and celebrates open source

Read More »

GNU libmicrohttpd (MHD) Library

At Least Authority, our mission is to bring verifiable end-to-end security to everyone. As a part of this mission, we provide security consulting services to free and open-source software projects. We recently performed a security audit of the GNU libmicrohttpd (MHD) library, on behalf of Mozilla’s Secure Open Source Fund. Mozilla’s SOS Fund is

Read More »

Ethereum – Incentive Analysis

By Andrew Miller, Brian Warner, Nathan Wilcox, Zooko Wilcox-O’Hearn S4 secure storage service, we also run a security consulting business. We LeastAuthoritarians have extensive experience in security and cryptography, and other companies sometimes hire us to analyze the security of their protocols and software. Our most recent consulting client is Ethereum. Ethereum is

Read More »

GlobaLeaks

Taylor Hornby on June 2, 2014 At Least Authority, our mission is to bring verifiable end-to-end security to everyone. As a part of this mission, we provide security consulting services to free and open-source software projects. We also run a verifiably-secure cloud backup system, S4. In the past, we’ve performed successful security audits of SpiderOak’s

Read More »

Cryptocat

Zooko Wilcox-O’Hearn on April 2, 2014 This is the second post in our series about security audits of Free and Open Source end-to-end encryption software. The first post in the series was about our security audit of SpiderOak’s crypton project. Our mission at LeastAuthority is to bring verifiable end-to-end security to

Read More »
Archives