Blog

World – Mobile IrisCode Self-Custody Upgrade (2nd Review)

We performed a second security audit of World’s MPC Circuit within the Mobile IrisCode Self-Custody Upgrade project, which allows users to self-host biometric data on their personal device while supporting high-integrity authentication for the World ID service. Our final audit report was completed on March 7, 2025. To read the

Read More »

World – SMPC Protocol (3rd Review)

Our team performed a review of the recent changes to World‘s secure multi-party computation protocol V2 (SMPC Protocol), which is used to match a given iris against a database of iris shares. In this third review, we audited the changes implemented in the second version of the protocol since our

Read More »

World – SMPC Protocol (2nd Review)

Our team performed a security audit of World‘s secure multi-party computation protocol (SMPC Protocol), which is used to match a given iris against a database of iris shares. Our team previously reviewed this implementation and delivered a Final Audit Report on April 4, 2024. In this review, we examined the

Read More »

World – SMPC Protocol

Least Authority performed a security audit of World’s SMPC Protocol for the uniqueness check of iris codes. To read the full report including our findings, click here: Report

Read More »

Capsule – Signing and Permissioning Toolkit

Least Authority, performed a security audit of Capsule Signing and Permissioning Toolkit. The Capsule is designed as a support system, providing several software development kits (SDKs) as well as infrastructure that can be used by developers and partner projects. Our final audit report was completed on January 3, 2024. An

Read More »

Integrating Advanced Cryptographic Techniques (ZKPs, MPC and FHE) with Artificial Intelligence (AI) and Machine Learning (ML)

Through our work, we have the opportunity to speak with various people in the FinTech, Cybersecurity, and Web3 fields. Recently, one pattern emerged: there is increasing interest in advanced cryptography techniques and protocols, such as zero-knowledge proofs (ZKPs), secure Multi-Party Computation (MPC), and Fully-Homomorphic Encryption (FHE), which can improve users’

Read More »
Archives