Blog

A Decade of Enabling Security-By-Design for Emerging Technologies

In January, we celebrated the 10-year anniversary of our first ever published security audit report. At the time of our first review, security consulting for privacy-enhancing and distributed technologies was a fledgling industry, and there were very few companies, like us, offering our specialized knowledge and expertise for security analysis

Read More »

Trust Machines – Multisafe

Trust Machines have requested that Least Authority perform a security audit of the Multisafe, a shared multi-signature crypto wallet for managing Stacks (STX) and Bitcoin (BTC). To read the full report including our findings, click here: Report

Read More »

MW4ALL Participates in NGI Bootcamp

Least Authority recently participated in a business scale-up bootcamp organized by NGI TETRA. The bootcamp offered us valuable lessons and the honor of being chosen as one of its ‘winners’. NGI (Next Generation Internet) is a program funded by the European Union, supporting a “Human Internet that respects the fundamental values

Read More »

ChainSafe – Lodestar Utility Libraries

Overview ChainSafe has requested that Least Authority perform a security audit of their Lodestar utility libraries. Lodestar is an Ethereum 2.0 implementation of the Beacon Chain. The following utility libraries are considered in scope: Persistent Merkle Tree: https://github.com/chainsafe/persistent-merkle-tree BLS key derivation and hd key utilities: https://github.com/ChainSafe/bls-hd-key Key management for BLS

Read More »

TQ Tezos – TzBTC for Tezos Foundation

Tezos Foundation requested that Least Authority perform a security audit of TzBTC, a BTC-backed token on Tezos. TzBTC enables the compliant issuance of a fully Bitcoin-backed token on the Tezos blockchain while aiming to eradicate the risks of a single-point-of-failure. This is achieved by dividing the various tasks into keyholders

Read More »

Our Audit of Ethereum Foundation’s Node Discovery Protocol

This summer, Least Authority was hired to audit the Ethereum 2.0 node discovery protocol. We enjoyed diving into the protocol, and found some issues that were really interesting to model and test. Read the full report here.  Proof of Identity The audit went smoothly and we were able to quickly

Read More »
Archives