iOS / Android Security Research

Beneath the surface.

Trust. Memory. Boundaries. Proof.

Practice

Quiet research. Defensive gravity.

01

Mobile OS security research

02

Mobile application security research

03

Defensive cybersecurity

04

Software development

Signals

Signals of work done with care.

Recipient, Apple Security Bounty

Holder of patent applications across mobile security domains

Company

Formal details, kept minimal.

Email

Company