Blog

Polygon – Plonky2

Least Authority performed a security audit of Plonky2 implementation of Polygon Zero, a library for recursive SNARKs. To read the full report including our findings, click here: Report

Read More »

Sovryn – Bi-directional FastBTC

Sovryn has requested that Least Authority perform a security audit of Bi-directional FastBTC. Bi-directional FastBTC is an update to FastBTC, which facilitates the transfer of Bitcoin to RSK. To read the full report including our findings, click here: Report

Read More »

Trust Machines – Multisafe

Trust Machines have requested that Least Authority perform a security audit of the Multisafe, a shared multi-signature crypto wallet for managing Stacks (STX) and Bitcoin (BTC). To read the full report including our findings, click here: Report

Read More »

Human-centered design at Least Authority

Human-centered design is one of the key approaches Least Authority adopts alongside security- and privacy-by-design. Our human-centered design process involves building an understanding of user needs and experiences, while using those learnings to shape design and development goals and iterations. The case studies below provide examples of this approach. The

Read More »

Dark Crystal social backup using Magic Wormhole

The following document is an extract from Magic Crystal, which describes how to leverage social secret sharing with Dark Crystal using Magic Wormhole for identity-less transport without using any Public Key Infrastructure. The document also includes a protocol design for developers wanting to integrate this feature into their application. It

Read More »
Archives