August concluded the NGI_Trust-funded MW4ALL 2.0 project, aimed at building an identity-less secure file transfer web application based on the Magic Wormhole protocol. Magic Wormhole is a protocol that allows for the rapid and secure sharing of data between two parties without either needing to know the other’s identity. Files
The Least Authority team reached a notable milestone this month, completing our 100th security audit with the publication of the Clorio Wallet + Mina Ledger JS audit report, funded by the Mina Foundation. Security audits are a key component of Least Authority’s security consulting services. They represent a significant part
Least Authority is pleased to announce the publication of the Zero Knowledge Access Passes (ZKAPs) Whitepaper. The paper is intended both for technical and non-technical audiences. ZKAPs, or Zero-Knowledge Access Passes, provide an anonymous, token-based authorization protocol based on Privacy Pass that facilitates an online exchange of value while disconnecting
Adequate preparation for a security audit is beneficial in a number of ways, both for the purposes of a security audit and in reinforcing development best practices that provide long-term benefits to projects and teams. Effective preparation enables security research teams to focus their efforts and time on reviewing the
Least Authority recently participated in a business scale-up bootcamp organized by NGI TETRA. The bootcamp offered us valuable lessons and the honor of being chosen as one of its ‘winners’. NGI (Next Generation Internet) is a program funded by the European Union, supporting a “Human Internet that respects the fundamental values
Something that should be simple—sending files—is surprisingly hard at the moment. Aside from figuring out a reliable tool, whether it supports the file you want to send and whether the recipient can open it, there are also privacy and security concerns. That’s why we started working on the Magic Wormhole
In March, Least Authority marked one year of working entirely remotely; twelve long months punctuated by frequent video conference calls keeping us connected. Fortunately, Least Authority is accustomed to operating as a remote-first company since it was founded in 2011, with teammates spanning across 19 time zones. Nevertheless, we are
In order to increase the transparency of our processes, we have compiled a list of Frequently Asked Questions for our Security Consulting work. The FAQs page provides details about our services, including: An Overview of Our Services, Planning and Preparing for a Security Audit, Responding to and Managing the Findings.