Blog

Dead Canaries – Onion Routed Cloud

The Onion Routed Cloud Project has requested Least Authority perform a security audit of Onion Routed Cloud (ORC), a piece of software designed to support and protect journalists and activists by providing an anonymous, distributed, and censorship resistant cloud.   Our final audit report was completed on April 5th, 2019.

Read More »

Tezos Protocol (5 Parts)

We are happy to release the results of the five security audits that Least Authority performed in 2018 for the Tezos Foundation, a Swiss non-profit organization that supports Tezos, a distributed, peer-to-peer, permissionless network, and the community around it. This series of security audits were done as part of the Tezos Foundation’s

Read More »

Cosmos – Blockchain SDK Framework

Least Authority performed a security audit of the Cosmos Blockchain SDK, a framework for building Proof of Stake state machines. The investigation and analysis were conducted by Emery Rose  Hall and Ramakrishnan Muthukrishnan, along with project management support by Hind Abu-Amr, in collaboration with Tendermint team members Jessy Irwin, Zaki Manian,

Read More »

How The TezBox Wallet Audit Should Inform How We Think About Privacy

Last September, I had the pleasure of performing a security audit for a Tezos project called TezBox, developed by Stephen Andrews. TezBox is a web based digital wallet for using the Tezos cryptocurrency. I’m always excited to audit JavaScript projects, especially those that run in the browser and secure your finances, because the

Read More »

Introducing P4: Private Periodic Payment Protocol

Least Authority has recently designed a protocol called the Private Periodic Payment Protocol, or P4, which aims to define the way in which subscription services can be funded using end-to-end private cryptocurrency payments. P4 incorporates the use of Zcash shielded transactions for private payments and leverages the Tor anonymity network’s onion services to radically reduce the amount of personally identifiable information (PII) available to merchants. In addition, P4 introduces…

Read More »

BEAM – Mimblewimble Implementation

At the request of BEAM, Least Authority performed a security audit of BEAM’s implementation of the Mimblewimble protocol, written in C++ and uses the Equihash Mining algorithm. Our review followed the launch of Testnet, in which the code was made open source, and preceded the launch of BEAM’s Mainnet. Our team members Ramakrishnan

Read More »
Archives