The zero-knowledge space is rapidly gaining traction as privacy becomes a critical concern due to the daily news of data breaches that expose personal information to malicious actors. With the . . .
Read MoreBlog
In our previous blog post, Security Audit Reports: A Guide for Everyone, we provided a comprehensive guide on how to read a security audit report. We discussed the various sections . . .
Read MoreIn 2014, we published our first security audit report. Since then, we have completed more than 200 audits and published more than half of those. The primary audience of an . . .
Read MoreIn January, we celebrated the 10-year anniversary of our first ever published security audit report. At the time of our first review, security consulting for privacy-enhancing and distributed technologies was . . .
Read MoreIn Part 1 of this blog, we delved into the constantly changing world of Web3, unveiling the opportunities it presents. In Part 2, we’re continuing this exploration with a focus . . .
Read MoreThis past year, we’ve started investigating new approaches to our security audit reports and recently we’re experimenting with structuring the data to be more usable by additional audiences and systems, . . .
Read MoreIn recent years the Web3 space, known for its innovation and community driven approaches, has witnessed a significant shift in its approach to funding and supporting projects. We have identified . . .
Read MoreOur work is more than a business for us: We see it as an avenue to advance the use of distributed technologies that empower users, especially their ability to control . . .
Read MoreThe belief that everyone has a right of privacy, including data privacy, is the base of all the work that we do at Least Authority. Key aspects of building privacy . . .
Read MoreOver the last few years we’ve been expanding our Ecosystem Support by including various Security Consulting offerings to meet the needs of the different ecosystems with which we are working. . . .
Read More