Highlights

Blog

Search
Decorative purple background for the blog title.

Background The newly adopted European Union (EU) Regulation on Markets in Crypto-Assets (MiCA Regulation) aims to provide a unified framework to regulate crypto-asset markets. Crypto-assets are defined in the MiCA . . .

Read More

At the end of March 2024, our team at Least Authority was selected for the role of Zcash Ecosystem Security Lead, after responding to a Request for Proposals (RFP) for the . . .

Read More

Strategic Alliances: Reflecting Dedication and Global Involvement The Importance of Strategic Alliances Forming alliances and joining industry associations allows us to expand our reach as experts in security and privacy. . . .

Read More

We are pleased to announce our collaboration with Bugcrowd.  Our mission is to support people’s right to privacy through security consulting and building secure solutions. As a leader in the . . .

Read More

Multiple steps are involved to ensure a successful collaboration on a planned security consulting engagement. Whether it requires a security audit, limited security evaluation, or security by design consultation, the . . .

Read More
The blog's title "Building the Zero-Knowledge Community: Engagement, Events, and Advocacy" on a light colored background banner.

The zero-knowledge space is rapidly gaining traction as privacy becomes a critical concern due to the daily news of data breaches that expose personal information to malicious actors. With the . . .

Read More
The blog title Enhance Your Understanding: An annotated Security Audit Report on a blue and white background banner.

In our previous blog post, Security Audit Reports: A Guide for Everyone, we provided a comprehensive guide on how to read a security audit report. We discussed the various sections . . .

Read More

In 2014, we published our first security audit report. Since then, we have completed more than 200 audits and published more than half of those. The primary audience of an . . .

Read More

In January, we celebrated the 10-year anniversary of our first ever published security audit report. At the time of our first review, security consulting for privacy-enhancing and distributed technologies was . . .

Read More

In Part 1 of this blog, we delved into the constantly changing world of Web3, unveiling the opportunities it presents. In Part 2, we’re continuing this exploration with a focus . . .

Read More

Videos