Our government affairs and legal counsel teams at Least Authority traveled to Washington DC in early April to attend the Global Privacy Summit 2023 hosted by the International Association of . . .
Read More
Our government affairs and legal counsel teams at Least Authority traveled to Washington DC in early April to attend the Global Privacy Summit 2023 hosted by the International Association of . . .
Read MoreLeast Authority would like to announce the creation of the “Least Authority Security Index”, a tokenized collection of our most security-dedicated clients. This index will provide diversified exposure to crypto . . .
Read MoreOur MoonMath Manual to zk-SNARKs is generating a lot of interest and so we’ve put together answers to some of the most common questions. What are zk-SNARKs and why should . . .
Read MoreHuman-centered design is one of the key approaches Least Authority adopts alongside security- and privacy-by-design. Our human-centered design process involves building an understanding of user needs and experiences, while using . . .
Read MoreThe following document is an extract from Magic Crystal, which describes how to leverage social secret sharing with Dark Crystal using Magic Wormhole for identity-less transport without using any Public . . .
Read MoreLeast Authority is pleased to announce the launch of Destiny, a free end-to-end encrypted application that allows you to transfer files without revealing your identity. The desktop app Mac, Windows, . . .
Read MorePrivy To is a series of immersive installations and XR projects first conceived in 2019 and created by Michelle Leddon, with the help of producers Julia Scott-Stevenson and co-sponsored by . . .
Read MoreWe want to alert the community that Manifest V2 extensions that are not already available in the Chrome Web Store will have to be reimplemented in the Manifest V3 extension . . .
Read More2021 seems to be the year that we all accepted the term “Web3” as the way to refer to the collective movements of decentralizing infrastructure and empowering users to be . . .
Read MoreAugust concluded the NGI_Trust-funded MW4ALL 2.0 project, aimed at building an identity-less secure file transfer web application based on the Magic Wormhole protocol. Magic Wormhole is a protocol that allows . . .
Read More