Blog

Security Consulting FAQs Page is Live

In order to increase the transparency of our processes, we have compiled a list of Frequently Asked Questions for our Security Consulting work. The FAQs page provides details about our services, including: An Overview of Our Services, Planning and Preparing for a Security Audit, Responding to and Managing the Findings.

Read More »

Our Audit of Ethereum Foundation’s Node Discovery Protocol

This summer, Least Authority was hired to audit the Ethereum 2.0 node discovery protocol. We enjoyed diving into the protocol, and found some issues that were really interesting to model and test. Read the full report here.  Proof of Identity The audit went smoothly and we were able to quickly

Read More »

How The TezBox Wallet Audit Should Inform How We Think About Privacy

Last September, I had the pleasure of performing a security audit for a Tezos project called TezBox, developed by Stephen Andrews. TezBox is a web based digital wallet for using the Tezos cryptocurrency. I’m always excited to audit JavaScript projects, especially those that run in the browser and secure your finances, because the

Read More »

Least Authority performs Security Audit of Knot DNS and Knot Resolver on behalf of Mozilla’s “SOS” Fund

Earlier this year, Least Authority completed a security audit of Knot DNS and the Knot Resolver for the Mozilla Secure Open Source (“SOS”) Fund. The Mozilla SOS Fund provides security auditing, remediation, and verification for key open source software projects. This Fund is part of the Mozilla Open Source Support program (MOSS) which recognizes and celebrates open source

Read More »
Archives