EIP-3074: AUTH and AUTHCALL opcodes specification, which aims to allow Externally Owned Accounts (EOAs) to delegate control of their account to a smart contract. This EIP introduces two Ethereum Virtual Machine (EVM) instructions, AUTH and AUTHCALL.
A Chialisp smart transaction and its dependencies. Chialisp is Chia’s new smart transaction programming language. The blockchain is powered by a Nakamoto style consensus algorithm and Proofs of Space and Time aim to replace energy intensive Proofs of Work by utilizing unused disk space.
Effective preparation enables security research teams to focus their efforts and time on reviewing the security of a project. In our latest blog post, we suggest five practical steps to help teams prepare for a security audit and get the most out of security audits.
On June 9th, Least Authority’s CEO Liz Steininger moderated a discussion at ZCon2 Lite on what it means to audit cryptography, how best to approach it and what we see as the future of cryptography audits.
"Within cryptocurrency and blockchain solutions, the concepts of decentralization, security, scalability and privacy are all enabled by cryptography. If we are to believe that these technical solutions are reliable, we are relying on the cryptography they utilize. Audits of both the types and implementations of cryptography by industry professionals are critical to advancing these solutions."
Secure Storage Solutions for Human Rights Defenders
Project Manager Abigail Garner represented Least Authority at RightsCon, the global summit on human rights in the digital age. Her lightning talk—"Counting on the cloud? Building secure storage solutions that human rights defenders can use and trust"—featured the HRO Cloud, which Least Authority has been developing as a potential solution to meet the file storage needs of human rights organizations.
As firm believers in protection of our users' privacy, we offer PrivateStorage as a private, secure and end-to-end encrypted solution that aims to minimize the collection of any data related to its users. PrivateStorage implements privacy and security by design, not by policy. We cannot see your data when it is stored by us.