Blog

Swarm – Bee + Bee Clef

Swarm has requested that Least Authority perform a security audit of Bee and Bee-clef. Bee is a client implemented in Go and is the basic building block for Swarm Network. Bee-clef is a key manager for use with the Bee client and a custom instance of Go Ethereum’s external signer,

Read More »

EIP-3074 for Ethereum Foundation

Ethereum Foundation has requested that Least Authority perform a security audit of the EIP-3074: AUTH and AUTHCALL opcodes specification, which aims to allow Externally Owned Accounts (EOAs) to delegate control of their account to a smart contract. This EIP introduces two Ethereum Virtual Machine (EVM) instructions, AUTH and AUTHCALL. The

Read More »

Zkopru zk-SNARK Circuits + Smart Contracts for Ethereum Foundation

Ethereum Foundation has requested that Least Authority perform a security audit of the Zkopru (zk-optimistic-rollup) zk-SNARK Circuits and Smart Contracts. Zkopru, a Zcash-Style privacy solution, is a layer-2 scaling solution for private transactions using zk-SNARK and optimistic rollup on the Ethereum Blockchain. It supports private transfer and private atomic swap

Read More »

ScopeLift – Umbra-js

ScopeLift requested that Least Authority perform a security audit of umbra-js, an off-chain JavaScript library that implements the basic cryptographic scheme for interacting with the Umbra Protocol and used for building Umbra-enabled Web3 applications in Node.js or in the browser. Umbra is a protocol for enabling stealth payments on the

Read More »

Blox Staking – Wallet

Blox has requested that Least Authority perform a security audit of the Blox Staking Wallet. Blox is an open-source, fully non custodial staking platform for Ethereum 2.0. The platform aims to serve as an easy and accessible way to stake Ether and earn rewards on Ethereum 2.0, while ensuring participants

Read More »

Loopring – 3.6 Design + Implementation: Smart Contracts and Circuit

Loopring is a flexible layer-2 scalability solution for basic value transactions as well as a variety of exchanges such as order book and Automated Market Maker (AMM). This system uses advanced cryptography in the form of a limited one-way homomorphic encryption using bilinear pairings, popularized in the implementation of the

Read More »
Archives