Blog

Navigating Web3 Wallets: Enabling a Secure User Experience

With our mission to support the development of usable technology solutions to advance digital security and preserve privacy as a fundamental human right, we see wallets as fundamental to empowering users and our security auditing efforts essential to enabling the effective use of wallets. Wallet developers must implement robust security

Read More »

Secure Development of MetaMask Snaps

MetaMask launched MetaMask Snaps Open Beta on September 12, 2023. Snaps extend the functionality of the MetaMask extension, which can then be used by connected DApps, for example, to add support for chains, conduct transaction inspections etc.  How MetaMask Snaps Work First and foremost, the extension of the functionality should

Read More »

Least Authority Attends The IAPP Global Privacy Summit

Our government affairs and legal counsel teams at Least Authority traveled to Washington DC in early April to attend the Global Privacy Summit 2023 hosted by the International Association of Privacy Professionals (IAPP). As Least Authority builds privacy-enhancing technology, we found it paramount to join, meet, and network with other

Read More »

Security Index Token Announcement

Least Authority would like to announce the creation of the “Least Authority Security Index”, a tokenized collection of our most security-dedicated clients.  This index will provide diversified exposure to crypto assets that have a high security rating, showing their commitment to high standards of security, as determined by Least Authority

Read More »

FAQs: MoonMath Manual to zk-SNARKs

Our MoonMath Manual to zk-SNARKs is generating a lot of interest and so we’ve put together answers to some of the most common questions. What are zk-SNARKs and why should I care? Zk-SNARKs, or zero-knowledge succinct non-interactive arguments of knowledge, is a type of zero-knowledge proof that allows for the

Read More »

Human-centered design at Least Authority

Human-centered design is one of the key approaches Least Authority adopts alongside security- and privacy-by-design. Our human-centered design process involves building an understanding of user needs and experiences, while using those learnings to shape design and development goals and iterations. The case studies below provide examples of this approach. The

Read More »
Archives