Least Authority's Avatar

Least Authority

@leastauthority

We're committed to building & supporting the development of technology solutions that advance digital security and preserve privacy as a human right.

61
Followers
17
Following
98
Posts
18.11.2024
Joined
Posts Following

Latest posts by Least Authority @leastauthority

Banner reading “Meet Us in Person” with the Least Authority logo over a blurred photo of a conference crowd.

Banner reading “Meet Us in Person” with the Least Authority logo over a blurred photo of a conference crowd.

Want to connect with our team and explore how we can strengthen your project's security? Meet us at these upcoming events:

📅 High-Assurance Crypto Software (HACS) — March 6–8
📅 @fheorg.bsky.social — March 8
📅 @rwc.iacr.org — March 9–11

05.03.2026 13:46 👍 1 🔁 0 💬 0 📌 0
Preview
SpiderOak - Least Authority A security audit of the SpiderOak Crypton.io framework.

In 2014, we published our first public security audit. Since then, we’ve published nearly 200.

Each one reflects our ongoing commitment to strengthening security, advancing privacy, and supporting transparency in open systems.

Our first audit: leastauthority.com/blog/least-a...

20.02.2026 13:03 👍 0 🔁 0 💬 0 📌 0
Post image

FHE.org would like to thank @leastauthority.bsky.social for their continued sponsorship this year (and last!) of the FHE.org 2026 conference.

#FHE #HomomorphicEncryption #FHE2026 #LeastAuthority

13.02.2026 14:02 👍 2 🔁 2 💬 1 📌 0
Preview
RWC 2026 registration Real World Crypto Symposium

Don’t miss the early registration deadline for Real World Crypto 2026 on February 6. rwc.iacr.org/2026/registr...

02.02.2026 14:12 👍 1 🔁 1 💬 0 📌 0
Preview
What Makes Privacy Possible, and What Produces It? - Least Authority What makes privacy happen, and what makes it possible? A look at how law creates obligations, but system architecture determines real privacy outcomes.

Privacy protections around user data aren’t static. They have to endure incidents, scale, enforcement pressure, and incentive shifts. leastauthority.com/blog/what-ma...

03.02.2026 14:58 👍 2 🔁 1 💬 0 📌 0

This #DataPrivacyDay we recognize the global community working to build safer, more private digital systems. From privacy engineers to open-source maintainers, your work empowers users and protects rights.

28.01.2026 20:04 👍 0 🔁 0 💬 0 📌 0
User Autonomy and Privacy-by-Default through Distributed, Resilient Systems
User Autonomy and Privacy-by-Default through Distributed, Resilient Systems YouTube video by Least Authority

At Funding the Commons (Berlin 2025), our CEO Liz Steininger makes the case that privacy is a missing native feature of Web3 and a prerequisite for true autonomy in decentralized systems. youtu.be/vjEifN52gLg?...

14.01.2026 14:58 👍 1 🔁 0 💬 0 📌 0
Preview
Strengthening Crypto Security via MiCA Compliance We can help Crypto-Assets Service Providers safely navigate the new MiCA regulation compliance environment and improve security.

The MiCA “grandfathering” period ends July 1, 2026, and some EU states have earlier deadlines. Cross-border CASPs must meet the earliest one. Now is the time to get your compliance strategy on track. leastauthority.com/blog/strengt...

08.01.2026 14:39 👍 0 🔁 0 💬 0 📌 0
Preview
Human Rights Day | United Nations Human Rights Day commemorates the day on which, in 1948, the United Nations General Assembly adopted the Universal Declaration of Human Rights.

We believe that people have a fundamental right to privacy and that the use of secure solutions enables people to more freely use the Internet and other connected technologies.

Privacy by design is not just a principle, it’s a responsibility.

www.un.org/en/observanc...

10.12.2025 13:10 👍 0 🔁 0 💬 0 📌 0
Preview
Lessons Learned from a Typosquatted Audit Report - Least Authority We identified and addressed a typosquatting issue promptly, but the incident reinforced why authenticity and provenance matter deeply in security reporting.

We recently discovered an unauthorized, modified version of one of our audit reports shared online via a deceptive URL. While we quickly resolved the issue, it served as a reminder of the importance of authenticity and provenance in security reporting. leastauthority.com/blog/lessons...

26.11.2025 16:27 👍 1 🔁 1 💬 0 📌 0
Preview
Zcash - NU6.1 Network Upgrade - Least Authority Least Authority reviewed the changes made to Zebra that will be introduced in the NU6.1 network upgrade.

Our team recently completed a security audit of Zebra's NU6.1 Network Upgrade for @zfnd.org. You can read the full report, including our findings, here: leastauthority.com/blog/audit-o...

19.11.2025 16:08 👍 3 🔁 2 💬 0 📌 0
Preview
Anonymous Data in the Age of AI: Hidden Risks and Safer Practices - Least Authority Data protection laws often do not apply to the lesser-known category of “anonymous data”. There are misleading claims and new risks.

Anonymized data is often treated as exempt from privacy obligations. However, the rise of anonymity washing, where organizations exaggerate anonymization to avoid regulation, is becoming a serious concern. leastauthority.com/blog/anonymo...

20.10.2025 13:38 👍 0 🔁 0 💬 0 📌 0
Preview
Areta Market Areta Market connects builders to top-tier auditors through a streamlined quoting and pricing process. Built to cut costs and simplify the process.

Least Authority is now listed as a trusted provider for the Avalanche Security Marketplace on Areta, where we bring our expertise to support developers and builders. areta.market/avalanche

See our Avalanche audit experience here: leastauthority.com?s=Avalanche

01.10.2025 14:04 👍 0 🔁 0 💬 0 📌 0
Preview
Aligned Layer - Layer Operator AVS + Smart Contracts (2nd review) - Least Authority Aligned Layer has requested that Least Authority perform a second security audit of their Operator AVS and smart contracts.

Our team recently completed a second security audit of Operator AVS and smart contracts for Aligned Layer. You can read the full report, including our findings, here: leastauthority.com/blog/audit-o...

19.09.2025 14:56 👍 0 🔁 0 💬 0 📌 0
Preview
Cypherpunks Write Code: Zooko Wilcox & Zcash | HackerNoon Zooko Wilcox grew up coding and questioning systems, and that path led him to create the privacy coin Zcash. Let's see more of this story!

Since @zooko2.bsky.social founded Least Authority in 2011, our mission has stayed true: advancing digital autonomy through privacy & cryptography. With 300+ completed audits, we continue to build on that vision for secure, freedom-compatible systems. hackernoon.com/cypherpunks-...

17.09.2025 13:07 👍 1 🔁 0 💬 0 📌 0
Preview
MoonMath Manual - Least Authority The MoonMath Manual is a resource for anyone interested in understanding and unlocking the potential of zk-SNARKs.

We’re celebrating a milestone: the MoonMath Manual has been downloaded 15,000 times! It’s a free resource for anyone curious about zk-SNARKs. Have you read it yet? We’d love to hear what you think: leastauthority.com/community-ma...

10.09.2025 19:01 👍 0 🔁 0 💬 0 📌 0
Preview
Balancing Privacy-Enhancing Technologies and Legal Disclosure Obligations - Least Authority Privacy-enhancing technologies, in particular Zero-Knowledge Proofs (ZKPs), can challenge, reinforce, or redefine these disclosure obligations.

Privacy matters. So does compliance. But can we have both? Yes - we can.

leastauthority.com/blog/balanci...

28.08.2025 12:26 👍 0 🔁 0 💬 0 📌 0
Preview
Chia Network - Permuto - Least Authority Chia Network has requested that Least Authority perform security audits of Permuto.

Our team recently completed three security audits of Permuto for @chia.net. You can read the full report, including our findings, here: leastauthority.com/blog/audit-o...

07.08.2025 17:33 👍 0 🔁 1 💬 0 📌 0
Preview
MoonMath Manual - Least Authority The MoonMath Manual is a resource for anyone interested in understanding and unlocking the potential of zk-SNARKs.

The MoonMath Manual breaks down the math behind Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge in an approachable, structured way. Whether you're new to ZK or want to deepen your understanding, this free resource is a great place to start. leastauthority.com/community-ma...

05.08.2025 12:17 👍 1 🔁 0 💬 0 📌 0
Preview
Turning Milestones Into Meaning: The Depth Behind Our Audits - Least Authority 300 audits completed reflects trust and experience, but our priority remains audit quality, not quantity.

With 300 completed security audits on the horizon, we're celebrating the journey - 11 years of security consulting shaped by technically challenging reviews, high-impact ecosystems, and projects with global reach. leastauthority.com/blog/turning...

23.07.2025 13:28 👍 1 🔁 0 💬 0 📌 0
Preview
Wallet V Labs - Wallet V - Least Authority Our team performed a security audit of a core module from Wallet V.

Our team recently completed a #securityaudit of a core module from walletv.io. You can read the full report, including our findings, here: leastauthority.com/blog/audit-o...

18.07.2025 16:55 👍 0 🔁 0 💬 0 📌 0
Preview
Security Consulting - Least Authority Our expert team delivers comprehensive security consulting services. We conduct audits and reviews of cryptographic protocols and distributed system architectures to ensure robust and reliable impleme...

We help Web3, blockchain, and FinTech teams build with security-by-design by identifying risks early and strengthening your systems for long-term resilience. Let’s talk about how we can support your next phase: leastauthority.com/security-con...

16.07.2025 21:38 👍 0 🔁 0 💬 0 📌 0
#38 | Least Authority: Auditing, Privacy, and Pioneering ZK
#38 | Least Authority: Auditing, Privacy, and Pioneering ZK YouTube video by Ingonyama

Our CEO Liz Steininger, & Security Researcher Anna Kaplan, joined the SNARK Chocolate podcast team from @ingonyama.com to talk about our roots, how to become a security auditor, privacy-first audits, applied cryptography trends, and the limits of AI in security work. youtu.be/Rw-jRay0nGk?...

11.07.2025 14:02 👍 0 🔁 0 💬 0 📌 0
Preview
Security Through Compliance - Least Authority Developed for and with Human Rights Organizations (HROs), Destiny is an open source secure file transfer application that does not reveal identities.

Strategic planning is essential for development teams preparing to meet new regulatory requirements. It helps ensure a smooth transition and reduces the risk of business disruption. We’re ready to support your team. Learn more: leastauthority.com/security-con...

20.06.2025 14:24 👍 0 🔁 0 💬 0 📌 0
Preview
Joey Wallet - Least Authority Our team performed a security audit of the Joey Wallet’s key management, focusing on the proper implementation of key derivation, management, and storage. Our final audit report was completed on June ...

Our team recently completed a #securityaudit of Joey Wallet key management. You can read the full report, including our findings, here: leastauthority.com/blog/audits/...

12.06.2025 14:23 👍 0 🔁 0 💬 0 📌 0
Least Authority | From Freedom to Autonomy - Liz Steininger | ETHDam III - 2025
Least Authority | From Freedom to Autonomy - Liz Steininger | ETHDam III - 2025 YouTube video by CryptoCanal

Catch the replay of "From Freedom to Autonomy: How Internet Freedom Principles Can Shape Web3 Privacy."

Liz explores privacy-by-default design, high-risk user needs, and how Internet Freedom values align with Web3. youtu.be/t68fai69wUA?...

06.06.2025 15:49 👍 0 🔁 0 💬 0 📌 0
Preview
Security Consulting - Least Authority Our expert team delivers comprehensive security consulting services. We conduct audits and reviews of cryptographic protocols and distributed system architectures to ensure robust and reliable impleme...

Building in security-by-design is key to long-term success. We support #web3 #blockchain, and #FinTech teams with #securityconsulting services that address vulnerabilities early and keep your project secure beyond launch. Schedule a call with us today: leastauthority.com/security-con...

04.06.2025 13:11 👍 1 🔁 0 💬 0 📌 0
Preview
The Right to Privacy in a Global Legal Context - Least Authority Explore how the right to privacy is defined and enforced around the world, with a focus on global data privacy laws and individual rights.

In our latest post, we explore how the legal concept of privacy differs across global jurisdictions. Understanding these variations is essential for building systems that respect user rights. #DataPrivacy #PrivacyLaw #GlobalCompliance #DigitalRights

leastauthority.com/blog/the-rig...

21.05.2025 15:18 👍 1 🔁 1 💬 1 📌 0
A banner image for the webinar. It includes pictures and names of the webinar guests, the date and time, and a QR code link for registration.

A banner image for the webinar. It includes pictures and names of the webinar guests, the date and time, and a QR code link for registration.

German fintechs: looking to scale in Asia? Join Liz and other experts for a webinar on why Singapore & Hong Kong are the next big launchpads for fintech growth. Insights, strategy, & live Q&A on how to enter and thrive in these competitive markets. hubspot.germanaccelerator.com/en/webinar-s...

15.05.2025 13:19 👍 1 🔁 0 💬 0 📌 0

Drawing from personal experience working with Internet Freedom projects—many of which predate blockchains or have developed in parallel—Liz will explore how lessons from this movement can inform and strengthen Web3's approach to privacy and user empowerment.

07.05.2025 13:31 👍 1 🔁 0 💬 0 📌 0