Blog

Strengthening Crypto Security via MiCA Compliance

Background The newly adopted European Union (EU) Regulation on Markets in Crypto-Assets (MiCA Regulation) aims to provide a unified framework to regulate crypto-asset markets. Crypto-assets are defined in the MiCA Regulation very broadly as ”a digital representation of a value or of a right that is able to be transferred

Read More »

Polygon – Plonky3

Our team performed a comprehensive audit of Polygon’s Plonky3, a toolkit for an efficient implementation of a non-hiding STARK protocol. The codebase consists of different cryptographic building blocks (such as fields, hash functions, polynomial commitment schemes, and others) that can be combined into STARKs. The overall goal is to build

Read More »

Security Audit Reports: A Guide for Everyone

In 2014, we published our first security audit report. Since then, we have completed more than 200 audits and published more than half of those. The primary audience of an audit report is the client’s project development team. However, stakeholders and other interested parties can also find value in reading

Read More »

World – Protocol Cryptography (2nd Review)

Our team conducted a second review of the upgrades to World‘s semaphore-mtb and the signup sequencer. Previously, our team had conducted a review of an earlier version of the codebase, which included World’s Rust implementation of the semaphore protocol and the Go implementation of the Semaphore Merkle Tree Batcher (SMTB).

Read More »

World – Protocol Cryptography

Least Authority performed a security audit for Tools for Humanity Corporation of the World Protocol Cryptographic implementation. To read the full report, including our findings, click here: Report

Read More »
Archives