Blog

Cosmos – Blockchain SDK Framework

Least Authority performed a security audit of the Cosmos Blockchain SDK, a framework for building Proof of Stake state machines. The investigation and analysis were conducted by Emery Rose  Hall and Ramakrishnan Muthukrishnan, along with project management support by Hind Abu-Amr, in collaboration with Tendermint team members Jessy Irwin, Zaki Manian,

Read More »

Privacy Technologies for Bitcoin

By the Zerocash Team, Greg Maxwell, and Least Authority Introduction The world still needs Zerocash even though we now have Confidential Transactions. A message from Zooko Wilcox-O’Hearn: At Least Authority, our mission is to bring verifiable end-to-end security to every user of the Internet. As a part of this mission, we are working on something

Read More »

A Bug in libsnark

Zooko Wilcox-O’Hearn, Alessandro Chiesa, Eli Ben-Sasson, Eran Tromer, Madars Virza on May 16, 2015 A statement from Least Authority Zooko Wilcox-O’Hearn writing: About us At Least Authority, our mission is to bring verifiable end-to-end security to everyone. As a part of this mission, we have been collaborating with the scientists behind zk-SNARKS, libsnark, and Zcash.

Read More »

Cryptocat

Zooko Wilcox-O’Hearn on April 2, 2014 This is the second post in our series about security audits of Free and Open Source end-to-end encryption software. The first post in the series was about our security audit of SpiderOak’s crypton project. Our mission at LeastAuthority is to bring verifiable end-to-end security to

Read More »

BLAKE2: “Harder, Better, Faster, Stronger” Than MD5

Zooko Wilcox-O’Hearn on March 21, 2014 Best read while listening to Daft Punk: Harder, Better, Faster, Stronger Why use BLAKE2 instead of Skein, Keccak (SHA-3), MD5, or SHA-1 as a secure hash function? BLAKE was the best-rated hash function in the SHA-3 competition NIST, in the final report of the SHA-3 competition, said this about

Read More »

SpiderOak

By Zooko Wilcox-O’Hearn S4 simple secure storage service, we also run a security consulting business. We Least Authoritarians have extensive experience in security and cryptography, and other companies pay us to analyze the security of their protocols and software. Almost all of our consulting clients are making Free and Open

Read More »
Archives