Privacy is often treated as a feature or a promise. Add encryption, write a policy, or comply with a regulation, and privacy is assumed to follow. Our work this past . . .
Read More
Privacy is often treated as a feature or a promise. Add encryption, write a policy, or comply with a regulation, and privacy is assumed to follow. Our work this past . . .
Read MoreOverview Recently, we encountered a situation that underscored the importance of verifiable transparency. A modified version of one of our audit reports was shared online through an unauthorized link pointing . . .
Read MorePrivacy’s Newest Threat. It’s no secret that in today’s digital economy, an era in which data is the new oil, entities are collecting, sharing, and analyzing personal information at an . . .
Read MoreWhat if Privacy Were the Default? Most digital services still require accounts, personal data, and behavioral tracking permissions, even for simple actions. It’s often assumed that convenience depends on identity. . . .
Read MoreDespite the preferences of data protection fundamentalists for minimal disclosure, disclosure obligations are legally required in several areas with the aim of protecting the integrity of the financial system and . . .
Read MoreThe Credibility Is in the Work. All audits are significant in their own ways, but some stand out for their technical complexity, ecosystem influence, or global significance. As we approach . . .
Read MoreAt Least Authority, we believe that people have a fundamental right to privacy. In a technical context, a “right to privacy” translates into concrete requirements and design principles that ensure . . .
Read MoreLeast Authority has been awarded a grant from the Ethereum Foundation’s Verified zkEVM program to create a comprehensive Lean blueprint for two cryptographic protocols, STIR [ACF+25] and WHIR [ACF+24], which . . .
Read MoreThreshold signing protocols, like FROST, help to facilitate trust while avoiding the reliance on a centralized authority. They do this by fault-tolerantly distributing information or computation among a cluster of . . .
Read MoreIn today’s rapidly evolving tech landscape, ensuring robust security is more than a checklist—it’s a collaborative journey. At Least Authority, our process begins by working closely with our client to . . .
Read More