Are you over 18 and want to see adult content?
More Annotations
A complete backup of subliminal-shop.com
Are you over 18 and want to see adult content?
A complete backup of solutions4it.co.uk
Are you over 18 and want to see adult content?
A complete backup of der-drachenfels.de
Are you over 18 and want to see adult content?
A complete backup of favorit-parts.ru
Are you over 18 and want to see adult content?
A complete backup of traderfeed.blogspot.com
Are you over 18 and want to see adult content?
Favourite Annotations
Bethel Half Marathon & 5k - Registration & Course
Are you over 18 and want to see adult content?
Checking In With Chelsea | Checking In With Chelsea
Are you over 18 and want to see adult content?
A complete backup of lotusleggings.com
Are you over 18 and want to see adult content?
Welcome to Profoil | Foiling and Embossing Professionals
Are you over 18 and want to see adult content?
Text
PRODUCT DEVELOPMENT
Magic Wormhole, created by developer Brian Warner, is a clever way to send files easily and securely. The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and donot need to be
CAREERS | LEAST AUTHORITY Least Authority is looking for a new team member to manage our financial operations and provide assistance with our financial strategies. The ideal person for this role has interest in cryptocurrency and working with a team of security experts and privacy-focused team members. TheSECURITY CONSULTING
March 2020 – The Ethereum Foundation has requested that Least Authority perform a security audit of the Ethereum 2.0 Consensus and Networking specifications. Ethereum 2.0, a Proof of Stake (PoS) / sharded protocol, is a major network upgrade that is set to take place in 3 distinct phases: Phase 0 – Beacon Chain, Phase 1 – Shard Chains, and Phase 2 – Execution Environments.LEASTAUTHORITY.COM
leastauthority.com
HOME | LEAST AUTHORITY Home | Least Authority - Privacy Matters ZKAPS | LEAST AUTHORITY Although we created ZKAPs to better address the access-control issue in Tahoe-LAFS for the development of PrivateStorage, we see many possibilities for the use of ZKAPs to help protect user privacy in other services that need to accept online payments. The use of ZKAPs can help facilitate an online exchange of value while disconnecting the payment and service data that is gathered on ACCESS PASSES ZERO KNOWLEDGE ZKAPS ZKAPs: Enabling Privacy in Required Data Collection Overview 1. Who We Are 2. ZKAPs (the intro) 3. Our Use Case & Problem 4. How PrivateStorage WorksLEAST AUTHORITY
Least Authority recently participated in a business scale-up bootcamp organized by NGI TETRA. The bootcamp offered us valuable lessons and the honor of being chosen as one of its ‘winners’. HOME | LEAST AUTHORITY Focus On Security We help projects improve their security and build secure technology. From prototype to production, we work closely with teams through the complete development cycle to identify security issues and promote best practices. Our consulting services include security audits, design reviews and multi-phase engagements. Schedule a Call Learn More Published Audit Reports ZCashThree ABOUT US | LEAST AUTHORITY Least Authority is committed to building and supporting the development of usable technology solutions and ethical business practices to advance digital security and preserve privacy as a fundamental human right. Conducting security audits and providing consulting services for software development projects, especially within Free and OpenPRODUCT DEVELOPMENT
Magic Wormhole, created by developer Brian Warner, is a clever way to send files easily and securely. The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and donot need to be
CAREERS | LEAST AUTHORITY Least Authority is looking for a new team member to manage our financial operations and provide assistance with our financial strategies. The ideal person for this role has interest in cryptocurrency and working with a team of security experts and privacy-focused team members. TheSECURITY CONSULTING
March 2020 – The Ethereum Foundation has requested that Least Authority perform a security audit of the Ethereum 2.0 Consensus and Networking specifications. Ethereum 2.0, a Proof of Stake (PoS) / sharded protocol, is a major network upgrade that is set to take place in 3 distinct phases: Phase 0 – Beacon Chain, Phase 1 – Shard Chains, and Phase 2 – Execution Environments.LEASTAUTHORITY.COM
leastauthority.com
HOME | LEAST AUTHORITY Home | Least Authority - Privacy Matters ZKAPS | LEAST AUTHORITY Although we created ZKAPs to better address the access-control issue in Tahoe-LAFS for the development of PrivateStorage, we see many possibilities for the use of ZKAPs to help protect user privacy in other services that need to accept online payments. The use of ZKAPs can help facilitate an online exchange of value while disconnecting the payment and service data that is gathered on ACCESS PASSES ZERO KNOWLEDGE ZKAPS ZKAPs: Enabling Privacy in Required Data Collection Overview 1. Who We Are 2. ZKAPs (the intro) 3. Our Use Case & Problem 4. How PrivateStorage WorksLEAST AUTHORITY
Least Authority recently participated in a business scale-up bootcamp organized by NGI TETRA. The bootcamp offered us valuable lessons and the honor of being chosen as one of its ‘winners’.PRODUCT DEVELOPMENT
Magic Wormhole, created by developer Brian Warner, is a clever way to send files easily and securely.The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed.PUBLISHED AUDITS
Published Security Audits We encourage transparency about security. Below is a list of reports our security consulting clients have chosen to publish. 2021 ScopeLift’s Umbra-js, May – Report Fractal’s Staking and Claims Registry Smart Contracts, May – Report Chia Network’s Coloured Coins Implementation, April – Report Equilibrium’s Vanilla Smart Contracts, March – Report Blox NEWSLETTER SUCCESS PAGE When subscribing, your email address is submitted to MailerLite which manages our newsletter system. See their privacy policy.PRIVACY POLICY
Version 2.0 – December 18, 2019 Read Version 1.0 – October 8, 2018. Least Authority is committed to protecting your privacy while you use Least Authority website, products and/or services. ETHEREUM 2.0 SPECIFICATIONS SECURITY AUDIT REPORT ETHEREUM Overview Background T h e E t h e r e u m F o u n d a t i o n h a s r e q u e s t e d t h a t L e a s t A u t h o r i t y pe r f o r m a s e c u r i t y a u d i t o f NODE DISCOVERY PROTOCOL FINAL PROTOCOL REVIEW REPORT Node Discovery Protocol Final Protocol Review Report Ethereum Foundation R e p o r t V e rsi o n : 25 O cto b er 201 9 METAMASK PLUGIN SYSTEM + LAVAMOAT SECURITY AUDIT REPORT Overview Background C o n s e n S y s A G h a s r e q u e s t e d t h a t L e a s t A u t h o r i t y pe r f o r m a s e c u r i t y a u d i t o f Me t a Ma s k , a br o w s e r S4 SUBSCRIPTION PAYMENTS VIA ZCASH SHIELDED TRANSACTIONS S4 Subscription Payments via Zcash Shielded Transactions and Tor P4: Private Periodic Payment Protocol P u b l i s h e d S pec i f i c ati o n V e r si o n: 23 J a n uary 2019 ACCESS PASSES ZERO KNOWLEDGE ZKAPS ZKAPs: Enabling Privacy in Required Data Collection Overview 1. Who We Are 2. ZKAPs (the intro) 3. Our Use Case & Problem 4. How PrivateStorage Works METAMASK MOBILE APPLICATION FINAL SECURITY AUDIT REPORT MetaMask Mobile Application Final Security Audit Report MetaMask R e p o r t V e rsi o n : 9 A p r i l 201 9 HOME | LEAST AUTHORITY Focus On Security We help projects improve their security and build secure technology. From prototype to production, we work closely with teams through the complete development cycle to identify security issues and promote best practices. Our consulting services include security audits, design reviews and multi-phase engagements. Schedule a Call Learn More Published Audit Reports ZCashThree ABOUT US | LEAST AUTHORITY Least Authority is committed to building and supporting the development of usable technology solutions and ethical business practices to advance digital security and preserve privacy as a fundamental human right. Conducting security audits and providing consulting services for software development projects, especially within Free and OpenPRODUCT DEVELOPMENT
Magic Wormhole, created by developer Brian Warner, is a clever way to send files easily and securely. The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and donot need to be
SECURITY CONSULTING
March 2020 – The Ethereum Foundation has requested that Least Authority perform a security audit of the Ethereum 2.0 Consensus and Networking specifications. Ethereum 2.0, a Proof of Stake (PoS) / sharded protocol, is a major network upgrade that is set to take place in 3 distinct phases: Phase 0 – Beacon Chain, Phase 1 – Shard Chains, and Phase 2 – Execution Environments. CAREERS | LEAST AUTHORITY Least Authority is looking for a new team member to manage our financial operations and provide assistance with our financial strategies. The ideal person for this role has interest in cryptocurrency and working with a team of security experts and privacy-focused team members. The CONTACT US | LEAST AUTHORITY Contact Us General Inquiries We welcome your questions, comments, suggestions, and friendly greetings at: contactus@leastauthority.com Security Consulting From design to production we help projects improve their security. Schedule a Call consulting@leastauthority.com Product Development We develop usable products that advance digital security and protect the privacy of users. ZKAPS: contactusLEASTAUTHORITY.COM
leastauthority.com
PUBLISHED AUDITS
Published Security Audits We encourage transparency about security. Below is a list of reports our security consulting clients have chosen to publish. 2021 ScopeLift’s Umbra-js, May – Report Fractal’s Staking and Claims Registry Smart Contracts, May – Report Chia Network’s Coloured Coins Implementation, April – Report Equilibrium’s Vanilla Smart Contracts, March – Report Blox NEWSLETTER | LEAST AUTHORITY When subscribing, your email address is submitted to MailerLite which manages our newsletter system. See their privacy policy. HOME | LEAST AUTHORITY Home | Least Authority - Privacy Matters HOME | LEAST AUTHORITY Focus On Security We help projects improve their security and build secure technology. From prototype to production, we work closely with teams through the complete development cycle to identify security issues and promote best practices. Our consulting services include security audits, design reviews and multi-phase engagements. Schedule a Call Learn More Published Audit Reports ZCashThree ABOUT US | LEAST AUTHORITY Least Authority is committed to building and supporting the development of usable technology solutions and ethical business practices to advance digital security and preserve privacy as a fundamental human right. Conducting security audits and providing consulting services for software development projects, especially within Free and OpenPRODUCT DEVELOPMENT
Magic Wormhole, created by developer Brian Warner, is a clever way to send files easily and securely. The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and donot need to be
SECURITY CONSULTING
March 2020 – The Ethereum Foundation has requested that Least Authority perform a security audit of the Ethereum 2.0 Consensus and Networking specifications. Ethereum 2.0, a Proof of Stake (PoS) / sharded protocol, is a major network upgrade that is set to take place in 3 distinct phases: Phase 0 – Beacon Chain, Phase 1 – Shard Chains, and Phase 2 – Execution Environments. CAREERS | LEAST AUTHORITY Least Authority is looking for a new team member to manage our financial operations and provide assistance with our financial strategies. The ideal person for this role has interest in cryptocurrency and working with a team of security experts and privacy-focused team members. The CONTACT US | LEAST AUTHORITY Contact Us General Inquiries We welcome your questions, comments, suggestions, and friendly greetings at: contactus@leastauthority.com Security Consulting From design to production we help projects improve their security. Schedule a Call consulting@leastauthority.com Product Development We develop usable products that advance digital security and protect the privacy of users. ZKAPS: contactusLEASTAUTHORITY.COM
leastauthority.com
PUBLISHED AUDITS
Published Security Audits We encourage transparency about security. Below is a list of reports our security consulting clients have chosen to publish. 2021 ScopeLift’s Umbra-js, May – Report Fractal’s Staking and Claims Registry Smart Contracts, May – Report Chia Network’s Coloured Coins Implementation, April – Report Equilibrium’s Vanilla Smart Contracts, March – Report Blox NEWSLETTER | LEAST AUTHORITY When subscribing, your email address is submitted to MailerLite which manages our newsletter system. See their privacy policy. HOME | LEAST AUTHORITY Home | Least Authority - Privacy Matters CONTACT US | LEAST AUTHORITY Contact Us General Inquiries We welcome your questions, comments, suggestions, and friendly greetings at: contactus@leastauthority.com Security Consulting From design to production we help projects improve their security. Schedule a Call consulting@leastauthority.com Product Development We develop usable products that advance digital security and protect the privacy of users. ZKAPS: contactusLEASTAUTHORITY.COM
leastauthority.com
UNDERSTANDING SECURITY FOR YOUR BLOCKCHAIN PROJECT Thanks to those that joined our event on blockchain security! On April 30th, we hosted a 1 hour session on why security matters, some common vulnerabilities and what an audit looks like, beginning to end. IMPRINT | LEAST AUTHORITY When subscribing, your email address is submitted to MailerLite which manages our newsletter system. See their privacy policy.ZKAPS - OLD
Although we created ZKAPs to better address the access-control issue in Tahoe-LAFS for the development of PrivateStorage, we see many possibilities for the use of ZKAPs to help protect user privacy in other services that need to accept online payments. The use of ZKAPs can help facilitate an online exchange of value while disconnecting the payment and service data that is gathered on S4 SUBSCRIPTION PAYMENTS VIA ZCASH SHIELDED TRANSACTIONS S4 Subscription Payments via Zcash Shielded Transactions and Tor P4: Private Periodic Payment Protocol P u b l i s h e d S pec i f i c ati o n V e r si o n: 23 J a n uary 2019ZCASH - HOME
Technical Details To execute a DNS rebinding attack, the attacker creates a website (zcash-attack.com) and serves a malicious website. The attacker also controls a REPORT OF SECURITY AUDIT OF CRYPTOCAT Findings Issue A. Disclosure of File Contents Due to Re-use Of Key and IV Reported: 2013-11-06 Synopsis: The file transfer feature re-uses a symmetric encryption key and IV in CTR-mode for multiple ACCESS PASSES ZERO KNOWLEDGE ZKAPS ZKAPs: Enabling Privacy in Required Data Collection Overview 1. Who We Are 2. ZKAPs (the intro) 3. Our Use Case & Problem 4. How PrivateStorage WorksLEAST AUTHORITY
Least Authority recently participated in a business scale-up bootcamp organized by NGI TETRA. The bootcamp offered us valuable lessons and the honor of being chosen as one of its ‘winners’. HOME | LEAST AUTHORITY Focus On Security We help projects improve their security and build secure technology. From prototype to production, we work closely with teams through the complete development cycle to identify security issues and promote best practices. Our consulting services include security audits, design reviews and multi-phase engagements. Schedule a Call Learn More Published Audit Reports ZCashThree ABOUT US | LEAST AUTHORITY Least Authority is committed to building and supporting the development of usable technology solutions and ethical business practices to advance digital security and preserve privacy as a fundamental human right. Conducting security audits and providing consulting services for software development projects, especially within Free and OpenPRODUCT DEVELOPMENT
Magic Wormhole, created by developer Brian Warner, is a clever way to send files easily and securely. The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and donot need to be
SECURITY CONSULTING
March 2020 – The Ethereum Foundation has requested that Least Authority perform a security audit of the Ethereum 2.0 Consensus and Networking specifications. Ethereum 2.0, a Proof of Stake (PoS) / sharded protocol, is a major network upgrade that is set to take place in 3 distinct phases: Phase 0 – Beacon Chain, Phase 1 – Shard Chains, and Phase 2 – Execution Environments. CAREERS | LEAST AUTHORITY Least Authority is looking for a new team member to manage our financial operations and provide assistance with our financial strategies. The ideal person for this role has interest in cryptocurrency and working with a team of security experts and privacy-focused team members. The CONTACT US | LEAST AUTHORITY Contact Us General Inquiries We welcome your questions, comments, suggestions, and friendly greetings at: contactus@leastauthority.com Security Consulting From design to production we help projects improve their security. Schedule a Call consulting@leastauthority.com Product Development We develop usable products that advance digital security and protect the privacy of users. ZKAPS: contactusLEASTAUTHORITY.COM
leastauthority.com
PUBLISHED AUDITS
Published Security Audits We encourage transparency about security. Below is a list of reports our security consulting clients have chosen to publish. 2021 ScopeLift’s Umbra-js, May – Report Fractal’s Staking and Claims Registry Smart Contracts, May – Report Chia Network’s Coloured Coins Implementation, April – Report Equilibrium’s Vanilla Smart Contracts, March – Report Blox NEWSLETTER | LEAST AUTHORITY When subscribing, your email address is submitted to MailerLite which manages our newsletter system. See their privacy policy. HOME | LEAST AUTHORITY Home | Least Authority - Privacy Matters HOME | LEAST AUTHORITY Focus On Security We help projects improve their security and build secure technology. From prototype to production, we work closely with teams through the complete development cycle to identify security issues and promote best practices. Our consulting services include security audits, design reviews and multi-phase engagements. Schedule a Call Learn More Published Audit Reports ZCashThree ABOUT US | LEAST AUTHORITY Least Authority is committed to building and supporting the development of usable technology solutions and ethical business practices to advance digital security and preserve privacy as a fundamental human right. Conducting security audits and providing consulting services for software development projects, especially within Free and OpenPRODUCT DEVELOPMENT
Magic Wormhole, created by developer Brian Warner, is a clever way to send files easily and securely. The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and donot need to be
SECURITY CONSULTING
March 2020 – The Ethereum Foundation has requested that Least Authority perform a security audit of the Ethereum 2.0 Consensus and Networking specifications. Ethereum 2.0, a Proof of Stake (PoS) / sharded protocol, is a major network upgrade that is set to take place in 3 distinct phases: Phase 0 – Beacon Chain, Phase 1 – Shard Chains, and Phase 2 – Execution Environments. CAREERS | LEAST AUTHORITY Least Authority is looking for a new team member to manage our financial operations and provide assistance with our financial strategies. The ideal person for this role has interest in cryptocurrency and working with a team of security experts and privacy-focused team members. The CONTACT US | LEAST AUTHORITY Contact Us General Inquiries We welcome your questions, comments, suggestions, and friendly greetings at: contactus@leastauthority.com Security Consulting From design to production we help projects improve their security. Schedule a Call consulting@leastauthority.com Product Development We develop usable products that advance digital security and protect the privacy of users. ZKAPS: contactusLEASTAUTHORITY.COM
leastauthority.com
PUBLISHED AUDITS
Published Security Audits We encourage transparency about security. Below is a list of reports our security consulting clients have chosen to publish. 2021 ScopeLift’s Umbra-js, May – Report Fractal’s Staking and Claims Registry Smart Contracts, May – Report Chia Network’s Coloured Coins Implementation, April – Report Equilibrium’s Vanilla Smart Contracts, March – Report Blox NEWSLETTER | LEAST AUTHORITY When subscribing, your email address is submitted to MailerLite which manages our newsletter system. See their privacy policy. HOME | LEAST AUTHORITY Home | Least Authority - Privacy Matters CONTACT US | LEAST AUTHORITY Contact Us General Inquiries We welcome your questions, comments, suggestions, and friendly greetings at: contactus@leastauthority.com Security Consulting From design to production we help projects improve their security. Schedule a Call consulting@leastauthority.com Product Development We develop usable products that advance digital security and protect the privacy of users. ZKAPS: contactusLEASTAUTHORITY.COM
leastauthority.com
UNDERSTANDING SECURITY FOR YOUR BLOCKCHAIN PROJECT Thanks to those that joined our event on blockchain security! On April 30th, we hosted a 1 hour session on why security matters, some common vulnerabilities and what an audit looks like, beginning to end. IMPRINT | LEAST AUTHORITY When subscribing, your email address is submitted to MailerLite which manages our newsletter system. See their privacy policy.ZKAPS - OLD
Although we created ZKAPs to better address the access-control issue in Tahoe-LAFS for the development of PrivateStorage, we see many possibilities for the use of ZKAPs to help protect user privacy in other services that need to accept online payments. The use of ZKAPs can help facilitate an online exchange of value while disconnecting the payment and service data that is gathered on S4 SUBSCRIPTION PAYMENTS VIA ZCASH SHIELDED TRANSACTIONS S4 Subscription Payments via Zcash Shielded Transactions and Tor P4: Private Periodic Payment Protocol P u b l i s h e d S pec i f i c ati o n V e r si o n: 23 J a n uary 2019ZCASH - HOME
Technical Details To execute a DNS rebinding attack, the attacker creates a website (zcash-attack.com) and serves a malicious website. The attacker also controls a REPORT OF SECURITY AUDIT OF CRYPTOCAT Findings Issue A. Disclosure of File Contents Due to Re-use Of Key and IV Reported: 2013-11-06 Synopsis: The file transfer feature re-uses a symmetric encryption key and IV in CTR-mode for multiple ACCESS PASSES ZERO KNOWLEDGE ZKAPS ZKAPs: Enabling Privacy in Required Data Collection Overview 1. Who We Are 2. ZKAPs (the intro) 3. Our Use Case & Problem 4. How PrivateStorage WorksLEAST AUTHORITY
Least Authority recently participated in a business scale-up bootcamp organized by NGI TETRA. The bootcamp offered us valuable lessons and the honor of being chosen as one of its ‘winners’. HOME | LEAST AUTHORITY Focus On Security We help projects improve their security and build secure technology. From prototype to production, we work closely with teams through the complete development cycle to identify security issues and promote best practices. Our consulting services include security audits, design reviews and multi-phase engagements. Schedule a Call Learn More Published Audit Reports ZCashThree ABOUT US | LEAST AUTHORITY Least Authority was formed in the U.S. in 2011 to create freedom-compatible technologies. In 2016, the company relocated to Berlin with Liz Steininger as CEO / Managing Director. We are a small team who believe that privacy matters in Internet technology.PRODUCT DEVELOPMENT
Magic Wormhole, created by developer Brian Warner, is a clever way to send files easily and securely.The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed.SECURITY CONSULTING
March 2020 – The Ethereum Foundation has requested that Least Authority perform a security audit of the Ethereum 2.0 Consensus and Networking specifications. Ethereum 2.0, a Proof of Stake (PoS) / sharded protocol, is a major network upgrade that is set to take place in 3 distinct phases: Phase 0 – Beacon Chain, Phase 1 – Shard Chains, and Phase 2 – Execution Environments. CAREERS | LEAST AUTHORITY This position can be project-based, part-time or full-time based on your interests and our needs. We’re looking for a Security or Cryptography Researcher & Engineer to join our team. CONTACT US | LEAST AUTHORITY Contact Us General Inquiries We welcome your questions, comments, suggestions, and friendly greetings at: contactus@leastauthority.com Security Consulting From design to production we help projects improve their security. Schedule a Call consulting@leastauthority.com Product Development We develop usable products that advance digital security and protect the privacy of users. ZKAPS: contactusPUBLISHED AUDITS
Published Security Audits We encourage transparency about security. Below is a list of reports our security consulting clients have chosen to publish. 2021 ScopeLift’s Umbra-js, May – Report Fractal’s Staking and Claims Registry Smart Contracts, May – Report Chia Network’s Coloured Coins Implementation, April – Report Equilibrium’s Vanilla Smart Contracts, March – Report Blox NEWSLETTER | LEAST AUTHORITY When subscribing, your email address is submitted to MailerLite which manages our newsletter system. See their privacy policy. HOME | LEAST AUTHORITY Home | Least Authority - Privacy Matters S4 SUBSCRIPTION PAYMENTS VIA ZCASH SHIELDED TRANSACTIONS S4 Subscription Payments via Zcash Shielded Transactions and Tor P4: Private Periodic Payment Protocol P u b l i s h e d S pec i f i c ati o n V e r si o n: 23 J a n uary 2019 HOME | LEAST AUTHORITY Focus On Security We help projects improve their security and build secure technology. From prototype to production, we work closely with teams through the complete development cycle to identify security issues and promote best practices. Our consulting services include security audits, design reviews and multi-phase engagements. Schedule a Call Learn More Published Audit Reports ZCashThree ABOUT US | LEAST AUTHORITY Least Authority was formed in the U.S. in 2011 to create freedom-compatible technologies. In 2016, the company relocated to Berlin with Liz Steininger as CEO / Managing Director. We are a small team who believe that privacy matters in Internet technology.PRODUCT DEVELOPMENT
Magic Wormhole, created by developer Brian Warner, is a clever way to send files easily and securely.The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed.SECURITY CONSULTING
March 2020 – The Ethereum Foundation has requested that Least Authority perform a security audit of the Ethereum 2.0 Consensus and Networking specifications. Ethereum 2.0, a Proof of Stake (PoS) / sharded protocol, is a major network upgrade that is set to take place in 3 distinct phases: Phase 0 – Beacon Chain, Phase 1 – Shard Chains, and Phase 2 – Execution Environments. CAREERS | LEAST AUTHORITY This position can be project-based, part-time or full-time based on your interests and our needs. We’re looking for a Security or Cryptography Researcher & Engineer to join our team. CONTACT US | LEAST AUTHORITY Contact Us General Inquiries We welcome your questions, comments, suggestions, and friendly greetings at: contactus@leastauthority.com Security Consulting From design to production we help projects improve their security. Schedule a Call consulting@leastauthority.com Product Development We develop usable products that advance digital security and protect the privacy of users. ZKAPS: contactusPUBLISHED AUDITS
Published Security Audits We encourage transparency about security. Below is a list of reports our security consulting clients have chosen to publish. 2021 ScopeLift’s Umbra-js, May – Report Fractal’s Staking and Claims Registry Smart Contracts, May – Report Chia Network’s Coloured Coins Implementation, April – Report Equilibrium’s Vanilla Smart Contracts, March – Report Blox NEWSLETTER | LEAST AUTHORITY When subscribing, your email address is submitted to MailerLite which manages our newsletter system. See their privacy policy. HOME | LEAST AUTHORITY Home | Least Authority - Privacy Matters S4 SUBSCRIPTION PAYMENTS VIA ZCASH SHIELDED TRANSACTIONS S4 Subscription Payments via Zcash Shielded Transactions and Tor P4: Private Periodic Payment Protocol P u b l i s h e d S pec i f i c ati o n V e r si o n: 23 J a n uary 2019PRODUCT DEVELOPMENT
Magic Wormhole, created by developer Brian Warner, is a clever way to send files easily and securely.The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. UNDERSTANDING SECURITY FOR YOUR BLOCKCHAIN PROJECT Thanks to those that joined our event on blockchain security! On April 30th, we hosted a 1 hour session on why security matters, some common vulnerabilities and what an audit looks like, beginning to end.PRIVACY POLICY
Version 2.0 – December 18, 2019 Read Version 1.0 – October 8, 2018. Least Authority is committed to protecting your privacy while you use Least Authority website, products and/or services.ZKAPS - OLD
Although we created ZKAPs to better address the access-control issue in Tahoe-LAFS for the development of PrivateStorage, we see many possibilities for the use of ZKAPs to help protect user privacy in other services that need to accept online payments. The use of ZKAPs can help facilitate an online exchange of value while disconnecting the payment and service data that is gathered on IMPRINT | LEAST AUTHORITY When subscribing, your email address is submitted to MailerLite which manages our newsletter system. See their privacy policy. SECURITY SESSIONS LEAST AUTHORITY SECURITY SESSIONS OUR MISSION We believe people have a right to privacy. We build and help others build usable secure technology thatincorporates
S4 SUBSCRIPTION PAYMENTS VIA ZCASH SHIELDED TRANSACTIONS S4 Subscription Payments via Zcash Shielded Transactions and Tor P4: Private Periodic Payment Protocol P u b l i s h e d S pec i f i c ati o n V e r si o n: 23 J a n uary 2019 REPORT OF SECURITY AUDIT OF GLOBALEAKS Overview Least Authority performed a security audit of GlobaLeaks on behalf of the Open Technology Fund. The audit consisted primarily of developer interviews, design analysis, and code review. REPORT OF SECURITY AUDIT OF CRYPTOCAT Findings Issue A. Disclosure of File Contents Due to Re-use Of Key and IV Reported: 2013-11-06 Synopsis: The file transfer feature re-uses a symmetric encryption key and IV in CTR-mode for multipleLEAST AUTHORITY
Least Authority recently participated in a business scale-up bootcamp organized by NGI TETRA. The bootcamp offered us valuable lessons and the honor of being chosen as one of its ‘winners’.Skip to content
* Home
* Security Consulting * Product Development* Community Matters
* About Us
* Blog
__ Menu
* Home
* Security Consulting * Product Development* Community Matters
* About Us
* Blog
* Home
* Security Consulting * Product Development* Community Matters
* About Us
* Blog
__ Menu
* Home
* Security Consulting * Product Development* Community Matters
* About Us
* Blog
FOCUS ON SECURITY
WE HELP PROJECTS IMPROVE THEIR SECURITY AND BUILD SECURE TECHNOLOGY. From prototype to production, we work closely with teams through the complete development cycle to identify security issues and promote best practices. Our consulting services include security audits, design reviews and multi-phase engagements.Schedule a Call
Learn More
PUBLISHED AUDIT REPORTSZCASH
Three Audits
ETHEREUM
Eth 2.0 SpecificationsBLOCKSTACK
Stack Investor WalletMETAMASK
Mobile App
TEZOS
Ecosystem Audits
PRIVACY BY DESIGN
At Least Authority, we believe in peoples’ right to privacy and are on a mission to make secure technology easy and accessible to everyone. We build technical solutions that incorporate these values and help technologies to be more secure.Product Development
Open Source Projects PRIVATESTORAGE (FORMERLY S4) PrivateStorage will launch in 2021. As firm believers in protection of our customers’ privacy, we will offer an end-to-end encrypted secure storage product that aims to minimize the collection of any data related to its users. PrivateStorage implements privacy and security by design, not by policy. We cannot see your data when it is stored byus.
Website
TAHOE-LAFS
A free and open, secure, decentralized, fault-tolerant, distributed data store and distributed file system. It can be used as an online backup system, or to serve as a file or Web host similar to Freenet, depending on the front-end used to insert and access files in theTahoe system.
Website
GitHub
ZKAPS
Zero Knowledge Access Passes attempt to solve the issue of privacy-preserving payments. This anonymous, token-based authorization protocol based on Privacy Pass for use PrivateStorage helps facilitate an online exchange of value while disconnecting the payment and service data that is gathered on customers.Learn More
MAGIC WORMHOLE
Get things from one computer to another, safely. Magic Wormhole, created by developer Brian Warner, is a clever way to send files easily and securely. The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and do not need to bememorized.
Learn More
Security Consulting
* Schedule a Call
* Public Reports
* Audit Process
Product Development
* PrivateStorage
* ZKAPs
* Magic Wormhole
Community Matters
* __ Special Projects * __ Open Source Dev* __ Grant Projects
Company
* Team
* Careers
* __ Blog
* __ Newsletter
Subscribe
THANK YOU!
You must confirm the double-opt email sent in order to complete thesignup process.
When subscribing, your email address is submitted to MailerLite which manages our newsletter system. See their privacy policy.
Github __
Linkedin __
Twitter __
Youtube __
Least Authority 2021 | Privacy Policy | Imprint |Contact Us
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0