MW4ALL 2.0: Building a Secure File Transfer Product
Something that should be simple—sending files—is surprisingly hard at the moment. That’s why we started working on the Magic Wormhole for All project last year and are continuing to a second phase. We’re now preparing to build a consumer product, to support identity-free and secure file transfers utilizing Magic Wormhole as the protocol base.
MW4ALL Highlighted as Winner at Bootcamp Competition
Least Authority recently participated in NGI TETRA Scale-up Bootcamp. This business bootcamp was organized by Next Generation Internet, the EU-supported funder of our MW4ALL projects. We were honored to be chosen as one of the ‘winners’ at the bootcamp's pitching competition. More importantly, we learned valuable lessons and will receive further mentorship for MW4ALL 2.0. This helps us on our path to make privacy-supporting products accessible and usable for everyone.
If privacy is something we want to protect, we should know what it is.
— Assembly of Privacy Doxographers
It’s not too late to get your tickets for Privy To, which generates new perspectives on privacy through watching and listening to brain activity in solitude, in intimate settings, and among strangers. Privy To is an inaugural project by the Assembly of Privacy Doxographers, a collective of makers, artists and producers, including Michelle Leddon, Julia Scott-Stevenson, Jason Snell and Least Authority’s Liz Steininger.
We are looking for a Client Coordinator to help us stay organized with and responsive to our security consulting clients and partners. This role provides key support to our security consulting project management team, helping us to continue delivering quality and value with our work.
You could be a software engineer, computer scientist, or mathematician who is interested in doing security research and engineering for advanced applied cryptography, especially with distributed systems. This position will work with our Security Consulting team on projects ranging from blockchain protocols to data management to zero-knowledge proofs. It involves analyzing designs, specifications and codebases, along with documenting findings, providing recommendations, and communicating with consulting clients. Research will use the latest security best practices, knowledge of advancements in related fields and previous experience / findings.