At Least Authority, we believe that people have a fundamental right to privacy. In a technical context, a “right to privacy” translates into concrete requirements and design principles that ensure . . .
Read More
At Least Authority, we believe that people have a fundamental right to privacy. In a technical context, a “right to privacy” translates into concrete requirements and design principles that ensure . . .
Read MoreLeast Authority has been awarded a grant from the Ethereum Foundation’s Verified zkEVM program to create a comprehensive Lean blueprint for two cryptographic protocols, STIR [ACF+25] and WHIR [ACF+24], which . . .
Read MoreThreshold signing protocols, like FROST, help to facilitate trust while avoiding the reliance on a centralized authority. They do this by fault-tolerantly distributing information or computation among a cluster of . . .
Read MoreIn today’s rapidly evolving tech landscape, ensuring robust security is more than a checklist—it’s a collaborative journey. At Least Authority, our process begins by working closely with our client to . . .
Read MoreCan Artificial Intelligence Be Integrated Into Our Workflow? At Least Authority, we are always exploring innovative ways to enhance our security auditing processes and improve our ability to identify vulnerabilities. . . .
Read MoreThe year 2024 was one of significant growth and collaboration across the Web3 landscape. From new grant funding initiatives to greater emphasis on security audits and privacy protections, the entire . . .
Read MoreCommitment to Privacy Requires Action In November 2024, our legal team attended the IAPP Europe Data Protection Congress in Brussels, Belgium, hosted by the International Association of Privacy Professionals (IAPP) . . .
Read MoreBackground The newly adopted European Union (EU) Regulation on Markets in Crypto-Assets (MiCA Regulation) aims to provide a unified framework to regulate crypto-asset markets. Crypto-assets are defined in the MiCA . . .
Read MoreAt the end of March 2024, our team at Least Authority was selected for the role of Zcash Ecosystem Security Lead, after responding to a Request for Proposals (RFP) for the . . .
Read MoreStrategic Alliances: Reflecting Dedication and Global Involvement The Importance of Strategic Alliances Forming alliances and joining industry associations allows us to expand our reach as experts in security and privacy. . . .
Read More