Blog

Holochain – Lair Keystore

Holo Ltd has requested that Least Authority perform a security audit of the Lair Keystore. The Lair Keystore is the secure keystore that holds private keys and seed and performs any and all cryptographic functions, which need to use private keys for the various Holochain subsystems requiring decryption, encryption, or

Read More »

Polygon – Plonky2

Least Authority performed a security audit of Plonky2 implementation of Polygon Zero, a library for recursive SNARKs. To read the full report including our findings, click here: Report

Read More »

Sovryn – Bi-directional FastBTC

Sovryn has requested that Least Authority perform a security audit of Bi-directional FastBTC. Bi-directional FastBTC is an update to FastBTC, which facilitates the transfer of Bitcoin to RSK. To read the full report including our findings, click here: Report

Read More »

Trust Machines – Multisafe

Trust Machines have requested that Least Authority perform a security audit of the Multisafe, a shared multi-signature crypto wallet for managing Stacks (STX) and Bitcoin (BTC). To read the full report including our findings, click here: Report

Read More »

Human-centered design at Least Authority

Human-centered design is one of the key approaches Least Authority adopts alongside security- and privacy-by-design. Our human-centered design process involves building an understanding of user needs and experiences, while using those learnings to shape design and development goals and iterations. The case studies below provide examples of this approach. The

Read More »
Archives