Blog

A Decade of Enabling Security-By-Design for Emerging Technologies

In January, we celebrated the 10-year anniversary of our first ever published security audit report. At the time of our first review, security consulting for privacy-enhancing and distributed technologies was a fledgling industry, and there were very few companies, like us, offering our specialized knowledge and expertise for security analysis

Read More »

Trust Machines – Multisafe

Trust Machines have requested that Least Authority perform a security audit of the Multisafe, a shared multi-signature crypto wallet for managing Stacks (STX) and Bitcoin (BTC). To read the full report including our findings, click here: Report

Read More »

MW4ALL Participates in NGI Bootcamp

Least Authority recently participated in a business scale-up bootcamp organized by NGI TETRA. The bootcamp offered us valuable lessons and the honor of being chosen as one of its ‘winners’. NGI (Next Generation Internet) is a program funded by the European Union, supporting a “Human Internet that respects the fundamental values

Read More »

ChainSafe – Lodestar Utility Libraries

Overview ChainSafe has requested that Least Authority perform a security audit of their Lodestar utility libraries. Lodestar is an Ethereum 2.0 implementation of the Beacon Chain. The following utility libraries are considered in scope: Persistent Merkle Tree: https://github.com/chainsafe/persistent-merkle-tree BLS key derivation and hd key utilities: https://github.com/ChainSafe/bls-hd-key Key management for BLS

Read More »

TQ Tezos – TzBTC for Tezos Foundation

Tezos Foundation requested that Least Authority perform a security audit of TzBTC, a BTC-backed token on Tezos. TzBTC enables the compliant issuance of a fully Bitcoin-backed token on the Tezos blockchain while aiming to eradicate the risks of a single-point-of-failure. This is achieved by dividing the various tasks into keyholders

Read More »
Archives