Security Consulting Services
From design to production, we help projects improve their security.
Spec & White Paper Reviews
Penetration Testing & Red Team Activities
Security by Design Consultation
Source Code Audits
Network & Traffic Analysis
Mechanism & Incentive Design
Decentralized Systems Architecture
Blockchains, Cryptocurrencies & Distributed Ledgers
Schedule a call.
We learn about your security needs and tell you about how we work.
Get a quote.
We’ll prepare a project proposal, including a timeline and budget.
Conduct the audit.
Our team of security researchers work with you to improve the security of your product.
Based on our recommendations, we support your team to address the issues identified.
We verify the security issues that have been addressed and deliver a final report (publishing optional).
Ethereum 2.0 Specifications
March 2020 – The Ethereum Foundation has requested that Least Authority perform a security audit of the Ethereum 2.0 Consensus and Networking specifications. Ethereum 2.0, a Proof of Stake (PoS) / sharded protocol, is a major network upgrade that is set to take place in 3 distinct phases: Phase 0 – Beacon Chain, Phase 1 – Shard Chains, and Phase 2 – Execution Environments. This audit is to be performed as in preparation for the Phase 0 mainnet launch in April 2020.
September 2019 – Ethereum Cat Herders, Ethereum Foundation, and Bitfly have requested that Least Authority perform a security audit of ProgPow, a Programmatic Proof-of-Work (PoW) algorithm to replace Ethash, in order to verify the security of the algorithm and provide clear metrics about its performance.
MetaMask Mobile Application
April 2019 – MetaMask has requested that Least Authority perform a security audit of their mobile application, a wallet and developer tool for applications built on Ethereum. MetaMask allows users to browse the web and interact with Ethereum applications, sign messages and transactions, and securely manage and store their private keys and assets.
Five Security Audits for the Tezos Foundation
March 2019 – We are happy to release the results of the five security audits that Least Authority performed in 2018 for the Tezos Foundation, a Swiss non-profit organization that supports Tezos, a distributed, peer-to-peer, permissionless network, and the community around it. This series of security audits were done as part of the Tezos Foundation’s effort to improve the security of the Tezos protocol and greater ecosystem.
Who We Are
We provide security consulting services to help others make their solutions more resistant to unauthorized access to data and unintended manipulation of their systems. We support teams from the design phase through the production launch and after through a variety of security consulting services.