Blog

Audit of Ethereum Foundation’s Node Discovery Protocol

The Ethereum Foundation requested that Least Authority perform a security audit of the next generation Node Discovery Protocol being developed for the Ethereum P2P network stack. The following components were considered in scope:  Node Discovery Protocol v5 – Specification Node Discovery Protocol v5 – Theory Node Discovery Protocol v5 –

Read More »

Audit of ProgPoW Algorithm

Ethereum Cat Herders, Ethereum Foundation, and Bitfly have requested that Least Authority perform a security audit of ProgPow, a Programmatic Proof-of-Work (PoW) algorithm to replac Ethash — in order to verify the security of the algorithm and provide clear metrics about its performance. This audit is part of the overall

Read More »

Least Authority Performs Security Audit of GNU libmicrohttpd (MHD)

At Least Authority, our mission is to bring verifiable end-to-end security to everyone. As a part of this mission, we provide security consulting services to free and open-source software projects. We recently performed a security audit of the GNU libmicrohttpd (MHD) library, on behalf of Mozilla’s Secure Open Source Fund. Mozilla’s SOS Fund is

Read More »

Least Authority Performs Incentive Analysis For Ethereum

By Andrew Miller, Brian Warner, Nathan Wilcox, Zooko Wilcox-O’Hearn S4 secure storage service, we also run a security consulting business. We LeastAuthoritarians have extensive experience in security and cryptography, and other companies sometimes hire us to analyze the security of their protocols and software. Our most recent consulting client is Ethereum. Ethereum is

Read More »
Archives