Blog

A Decade of Enabling Security-By-Design for Emerging Technologies

In January, we celebrated the 10-year anniversary of our first ever published security audit report. At the time of our first review, security consulting for privacy-enhancing and distributed technologies was a fledgling industry, and there were very few companies, like us, offering our specialized knowledge and expertise for security analysis

Read More »

MetaMask – Mobile App

Least Authority conducted a security audit of the MetaMask mobile application, a wallet and developer tool for applications built on Ethereum. MetaMask allows users to browse the web and interact with Ethereum applications, sign messages and transactions, and securely manage and store their private keys and assets. The mobile application is built in React Native within a single codebase for both iOS and Android platforms. MetaMask previously built and released a web extension providing the…

Read More »

Tezos Protocol (5 Parts)

We are happy to release the results of the five security audits that Least Authority performed in 2018 for the Tezos Foundation, a Swiss non-profit organization that supports Tezos, a distributed, peer-to-peer, permissionless network, and the community around it. This series of security audits were done as part of the Tezos Foundation’s

Read More »

Cosmos – Blockchain SDK Framework

Least Authority performed a security audit of the Cosmos Blockchain SDK, a framework for building Proof of Stake state machines. The investigation and analysis were conducted by Emery Rose  Hall and Ramakrishnan Muthukrishnan, along with project management support by Hind Abu-Amr, in collaboration with Tendermint team members Jessy Irwin, Zaki Manian,

Read More »
Archives