Blog

The Limits of Legal Control in Technical Systems

Data protection laws, such as the EU’s General Data Protection Regulation (GDPR), establish a comprehensive framework of individual rights intended to give data subjects greater control over the processing of their personal data. Together, these data protection rights aim to empower individuals while restricting how organizations use and process that

Read More »

The Right to Privacy in a Global Legal Context

At Least Authority, we believe that people have a fundamental right to privacy. In a technical context, a “right to privacy” translates into concrete requirements and design principles that ensure users maintain meaningful control over their personal data. Our security consulting work is rooted in this value as we help

Read More »

Ensuring the Secure Use of the FROST Protocol

Threshold signing protocols, like FROST, help to facilitate trust while avoiding the reliance on a centralized authority. They do this by fault-tolerantly distributing information or computation among a cluster of cooperating computers. With the rapid advancement of secure digital systems, threshold cryptography is gaining traction through securing multi-signature wallets, protecting

Read More »

Navigating the Audit Process: Client Engagement and Technical Methodology

In today’s rapidly evolving tech landscape, ensuring robust security is more than a checklist—it’s a collaborative journey. At Least Authority, our process begins by working closely with our client to define the audit scope and secure the essential documentation and resources. Through in-depth technical discussions, we pinpoint key concerns and

Read More »

Strengthening Crypto Security via MiCA Compliance

We can help Crypto-Assets Service Providers safely navigate the new MiCA regulation compliance environment and improve security. We can help Crypto-Assets Service Providers safely navigate the new MiCA regulation compliance environment and improve security. Background The newly adopted European Union (EU) Regulation on Markets in Crypto-Assets (MiCA Regulation) aims to

Read More »

Security Audit Reports: A Guide for Everyone

In 2014, we published our first security audit report. Since then, we have completed more than 200 audits and published more than half of those. The primary audience of an audit report is the client’s project development team. However, stakeholders and other interested parties can also find value in reading

Read More »
Archives