Blog

BEAM – Mimblewimble Implementation

At the request of BEAM, Least Authority performed a security audit of BEAM’s implementation of the Mimblewimble protocol, written in C++ and uses the Equihash Mining algorithm. Our review followed the launch of Testnet, in which the code was made open source, and preceded the launch of BEAM’s Mainnet. Our team members Ramakrishnan

Read More »

Ethereum – Incentive Analysis

By Andrew Miller, Brian Warner, Nathan Wilcox, Zooko Wilcox-O’Hearn S4 secure storage service, we also run a security consulting business. We LeastAuthoritarians have extensive experience in security and cryptography, and other companies sometimes hire us to analyze the security of their protocols and software. Our most recent consulting client is Ethereum. Ethereum is

Read More »

Privacy Technologies for Bitcoin

By the Zerocash Team, Greg Maxwell, and Least Authority Introduction The world still needs Zerocash even though we now have Confidential Transactions. A message from Zooko Wilcox-O’Hearn: At Least Authority, our mission is to bring verifiable end-to-end security to every user of the Internet. As a part of this mission, we are working on something

Read More »
Archives