Consultation Services

because the blue team has to win

OS Hardening

Linux operating system attack surface reduction

Security Architecture

Designing complex systems, protocols and interfaces

Machine Learning

Security of Machine Learning Systems, including IP protection

Software Development

Secure Developement Practices & Tooling

Security Research

Reverse Engineering and Tooling for Exploitation

Cryptography

Robust design using best practices, from existing building blocks

Contact