Blog

Zero Knowledge Privacy in Regulated Financial Transactions

Zero knowledge proofs (ZKPs) are an extremely robust, privacy-enhancing tool that can prove a computational statement is true without revealing the data behind it.  While still at the early adoption stage, ZKPs are gaining traction as a potential solution to a vast array of privacy conundrums. These cryptographic building blocks

Read More »

2020: Least Authority’s Year in Review

Before highlighting Least Authority’s accomplishments from 2020, I must first acknowledge that this year has been a difficult year for so many people around the world, and on many levels. There has been suffering from health issues and significant economic consequences, and as a result we all see 2020 as

Read More »

Project Update: Tahoe-LAFS for Human Rights Defenders

This summer, Least Authority has been wrapping up our project funded by the Open Technology Fund (OTF) to make Tahoe-LAFS a more usable tool for human rights organizations. (Read about the background on this project in our earlier post.) While secure file storage is a necessity for most everyone, human

Read More »

We’re upgrading Magic Wormhole to Magic Wormhole for All

The Problem Sending a file from one computer to another is common and should be simple, but it can be surprisingly complicated, even in 2020. This simple-yet-complicated user story is illustrated in xkcd comic #949. How should you send a file from your computer to someone else’s computer? What security

Read More »

Using ZKAPs to Disconnect Payment Data from Service Data

A note from the team: we’re continually looking for possible applications of ZKAPs in a variety of scenarios. If there is a product or project you’re working on that you would like to test ZKAPs with, don’t hesitate to get in touch! Last month, our team, the Least Authoritarians, gave

Read More »

Adapting Secure File Storage Tools for Human Rights Defenders

Least Authority is committed to supporting privacy as a fundamental human right and to actively participate in making privacy-focused open-source tools available for everyone. In the case of  human rights defenders, protecting their sensitive files—including reports, photos, videos, and other documentation—is a necessity, and at times, a matter of the

Read More »

Our Audit of Ethereum Foundation’s Node Discovery Protocol

This summer, Least Authority was hired to audit the Ethereum 2.0 node discovery protocol. We enjoyed diving into the protocol, and found some issues that were really interesting to model and test. Read the full report here.  Proof of Identity The audit went smoothly and we were able to quickly

Read More »
Archives