Blog

Strengthening Crypto Security via MiCA Compliance

Background The newly adopted European Union (EU) Regulation on Markets in Crypto-Assets (MiCA Regulation) aims to provide a unified framework to regulate crypto-asset markets. Crypto-assets are defined in the MiCA Regulation very broadly as ”a digital representation of a value or of a right that is able to be transferred

Read More »

Security Consulting FAQs Page is Live

In order to increase the transparency of our processes, we have compiled a list of Frequently Asked Questions for our Security Consulting work. The FAQs page provides details about our services, including: An Overview of Our Services, Planning and Preparing for a Security Audit, Responding to and Managing the Findings.

Read More »

ChainSafe – Lodestar Utility Libraries

Overview ChainSafe has requested that Least Authority perform a security audit of their Lodestar utility libraries. Lodestar is an Ethereum 2.0 implementation of the Beacon Chain. The following utility libraries are considered in scope: Persistent Merkle Tree: https://github.com/chainsafe/persistent-merkle-tree BLS key derivation and hd key utilities: https://github.com/ChainSafe/bls-hd-key Key management for BLS

Read More »

TQ Tezos – TzBTC for Tezos Foundation

Tezos Foundation requested that Least Authority perform a security audit of TzBTC, a BTC-backed token on Tezos. TzBTC enables the compliant issuance of a fully Bitcoin-backed token on the Tezos blockchain while aiming to eradicate the risks of a single-point-of-failure. This is achieved by dividing the various tasks into keyholders

Read More »
Archives