Blog

TRON Protocol

TRON has requested that Least Authority perform a security audit of their TRON Protocol, including the following components: TRON Protocol Blockchain-based operating systems that aims to offer scalable, high-availability and high-throughput support that underlies all the decentralized applications in the TRON ecosystem. TRON Virtual Machine (TVM) Allows users to develop

Read More »

MetaMask – Plugin System + LavaMoat

ConsenSys AG has requested that Least Authority perform a security audit of MetaMask, a browser extension that enables interaction with applications built on Ethereum. MetaMask allows users to browse the web and interact with Ethereum applications, sign messages and transactions, and securely manage and store their private keys and assets. 

Read More »

Adapting Secure File Storage Tools for Human Rights Defenders

Least Authority is committed to supporting privacy as a fundamental human right and to actively participate in making privacy-focused open-source tools available for everyone. In the case of  human rights defenders, protecting their sensitive files—including reports, photos, videos, and other documentation—is a necessity, and at times, a matter of the

Read More »

MetaMask – Permissions System + CapNode

ConsenSys AG has requested that Least Authority perform a security audit of MetaMask, a browser extension that enables interaction with applications built on Ethereum. MetaMask allows users to browse the web and interact with Ethereum applications, sign messages and transactions, and securely manage and store their private keys and assets.

Read More »

Our Audit of Ethereum Foundation’s Node Discovery Protocol

This summer, Least Authority was hired to audit the Ethereum 2.0 node discovery protocol. We enjoyed diving into the protocol, and found some issues that were really interesting to model and test. Read the full report here.  Proof of Identity The audit went smoothly and we were able to quickly

Read More »

Ethereum – Node Discovery Protocol

The Ethereum Foundation requested that Least Authority perform a security audit of the next generation Node Discovery Protocol being developed for the Ethereum P2P network stack. The following components were considered in scope:  Node Discovery Protocol v5 – Specification Node Discovery Protocol v5 – Theory Node Discovery Protocol v5 –

Read More »

Nervos Network

Nervos has requested that Least Authority perform a security audit of the Nervos Network, an open source multi-asset, Proof of Work blockchain, featuring a novel consensus scheme called NC-Max. Nervos is a decentralized application network consisting of a layered architecture, including the layer 1 protocol known as CKB (Common Knowledge

Read More »

Ethereum – ProgPoW Algorithm

Ethereum Cat Herders, Ethereum Foundation, and Bitfly have requested that Least Authority perform a security audit of ProgPow, a Programmatic Proof-of-Work (PoW) algorithm to replace Ethash — in order to verify the security of the algorithm and provide clear metrics about its performance. This audit is part of the overall

Read More »
Archives