SYRAX OPERATIONS

Research Portfolio

A curated collection of observational research notes, design-level analyses, and conceptual threat modelling exploring security architecture, identity systems, and operational trust boundaries.

The research spans user-observable system behaviour, architectural decision-making, and hypothetical risk scenarios, with an emphasis on understanding how secure systems function in practice and how design assumptions can influence security outcomes.

Digital Identity, Authentication & Trust Enforcement

Explores weaknesses in how digital identity, sessions, and trust are handled across government and financial systems, highlighting how design assumptions and user behaviour can lead to identity exposure, unauthorized access, and systemic trust failures.

Digital Identity Abuse & Governance

Examining how digital identity systems fail under consent-based misuse, governance gaps, and misplaced trust across public and federated services.

Site Under Construction

Radar icon by Icons8