Research 001
Identity Workflows & Trust Enforcement Analysis
Examining how identity proofs, sessions, and verification flows behave across linked systems and where trust can fail.
Read ArticleA curated collection of observational research notes, design-level analyses, and conceptual threat modelling exploring security architecture, identity systems, and operational trust boundaries.
The research spans user-observable system behaviour, architectural decision-making, and hypothetical risk scenarios, with an emphasis on understanding how secure systems function in practice and how design assumptions can influence security outcomes.
Digital Identity, Authentication & Trust Enforcement
Explores weaknesses in how digital identity, sessions, and trust are handled across government and financial systems, highlighting how design assumptions and user behaviour can lead to identity exposure, unauthorized access, and systemic trust failures.
Digital Identity Abuse & Governance
Examining how digital identity systems fail under consent-based misuse, governance gaps, and misplaced trust across public and federated services.