Tezos Foundation has requested that Least Authority perform a security audit of the Wrap Protocol Smart Contracts. Wrap is a bridge that allows users to wrap ERC20 tokens into FA2 tokens on the Tezos Blockchain. Our final audit report was completed on May 24th, 2021. To read the full report
Chia Network has requested that Least Authority perform a security audit of the Coloured coin implementation, a Chialisp smart transaction and its dependencies. Chia Network aims to build a blockchain and smart transaction platform that is decentralized, efficient, and secure. Chialisp is Chia’s new smart transaction programming language. The blockchain
Fractal has requested that Least Authority perform a security audit of the Staking and Claims Registry smart contracts. Fractal is an open source protocol that aims to define a basic standard to exchange user information in a fair and open way while ensuring a high-quality version of the free internet.
Least Authority recently participated in a business scale-up bootcamp organized by NGI TETRA. The bootcamp offered us valuable lessons and the honor of being chosen as one of its ‘winners’. NGI (Next Generation Internet) is a program funded by the European Union, supporting a “Human Internet that respects the fundamental values
Something that should be simple—sending files—is surprisingly hard at the moment. Aside from figuring out a reliable tool, whether it supports the file you want to send and whether the recipient can open it, there are also privacy and security concerns. That’s why we started working on the Magic Wormhole
In March, Least Authority marked one year of working entirely remotely; twelve long months punctuated by frequent video conference calls keeping us connected. Fortunately, Least Authority is accustomed to operating as a remote-first company since it was founded in 2011, with teammates spanning across 19 time zones. Nevertheless, we are
In order to increase the transparency of our processes, we have compiled a list of Frequently Asked Questions for our Security Consulting work. The FAQs page provides details about our services, including: An Overview of Our Services, Planning and Preparing for a Security Audit, Responding to and Managing the Findings.