iOS / Android Security Research
Beneath the surface.
Trust. Memory. Boundaries. Proof.
Practice
Quiet research. Defensive gravity.
Mobile application security research
Defensive cybersecurity
Software development
Signals
Signals of work done with care.
Recipient, Apple Security Bounty
Holder of patent applications across mobile security domains
Company
Formal details, kept minimal.
Company