Blog

Conference Schedule

11:00 – 11:20 Networking, refreshments and morning snacks, welcome message 11:20 – 11:45 Why Privacy Matters Zooko Wilcox (Zcash) 11:45 – 12:15 Inspiring a Movement Rick Falkvinge (Private Internet Access) 12:15 – 13:05 Data Protection Panel Silvan Jongerius (TechGDPR), Florian Glatz (BLOCKCHAIN.LAWYER), Jan Sahl and moderated by Tom Braegelmann (LEVERTON)

Read More »

Code of Conduct for the conference – “Privacy For Everyone”

We are committed to providing a safe, inclusive, welcoming, and harassment-free conference experience for everyone. We have a Code of Conduct that we expect all attendees to adhere to. This Code of Conduct applies to the conference and the networking evening. Harassment and other exclusionary behavior aren’t acceptable. This includes and is not limited to:

Read More »

Introduction to Mix Networks and Anonymous Communication Networks

Anonymous communication networks like the Tor network hide metadata from passive network observers. While the term ‘anonymous’ is used to mean many things, in this context we are speaking in terms of the inability of a network observer or attacker to link actions on a network with its participants [ANONTERMS]. Even

Read More »

Why We Need Client-Side Encryption?

Already in 2017, there has been an inordinate number of cybersecurity meltdowns. This complex and constantly evolving range of security threats lead many of us to wonder how we can best protect our data from theft or loss. Many cloud providers advertise their use of end-to-end encryption for security. However, some of the important data breaches in the past have demonstrated that end-to-end encryption may not be enough. What is end-to-end encryption? End to end encryption is a method of…

Read More »

Least Authority’s new comic explains Tahoe-LAFS based S4

Least Authority is excited to present a short comic which explains our Tahoe-LAFS based Simple Secure Storage Service (S4) with a simple narrative illustration. It demonstrates how our products/services provide a more secure alternative to popular online services. To learn more, read on. Special thanks to Sam Hester from The 23rd Story for her brilliant illustrations.

Read More »

Least Authority Performs Security Audit of GNU libmicrohttpd (MHD)

At Least Authority, our mission is to bring verifiable end-to-end security to everyone. As a part of this mission, we provide security consulting services to free and open-source software projects. We recently performed a security audit of the GNU libmicrohttpd (MHD) library, on behalf of Mozilla’s Secure Open Source Fund. Mozilla’s SOS Fund is

Read More »
Archives