I work at the intersection of adversarial systems and information theory — where human cognition breaks, cryptographic assumptions dissolve, and the digital meets the physical.
Post-graduate work in Digital Forensics & Information Security gave me one useful habit: reverse-engineering how things fail before trying to build things that don't. That's still how I approach everything.
The lab is fpszero.com.
Spectra — SvelteKit · TypeScript · YAML · IndexedDB
Most security audit tools give you the same checklist regardless of who you are. Spectra doesn't. A journalist and a stalking target face different adversaries — the scoring engine reflects that. It runs entirely in your browser. Nothing leaves your device. The more interesting part: it audits cognitive attack surfaces alongside technical ones, because social engineering remains the highest-probability attack vector and almost no tool treats it that way.
→ spectra.fpszero.com · source
FPS Zero — Vanilla JS · WebGL · Three.js
No frameworks I didn't choose. No abstraction layers I don't own. The moon phase on the site is calculated in real-time from UTC celestial mechanics — not an API call, not a static asset. There's a functional terminal gateway.
Active in stealth: a browser-based anti-phishing detection engine using local multi-headed attention models. The premise is that phishing is a cognitive exploit, not a URL problem. Most defenses are solving the wrong thing.
Also ongoing: visualizing wave function collapse and superposition. Mapping the gap between biological synapses and silicon gates.
→ fpszero.com · source
FPS Zero Lab — In development
Structured knowledge base for practitioners across Cybersecurity, Digital Forensics, Quantum Computing, and AI. Proper categories. Primary sources. Not another link dump.
Post-quantum cryptography isn't a career pivot for me — it's the natural endpoint of studying how adversarial systems break. The classical cryptographic assumption is that computation is hard. Shor's algorithm doesn't care about that assumption.
The NIST standardization (FIPS 203/204/205) is the most consequential cryptographic migration in human history. It's happening right now. I'm deep in it.
Currently working through: lattice hardness assumptions · ML-KEM and ML-DSA constructions · Nielsen & Chuang · recent arXiv on PQC migration strategies.
The forensics background isn't a detour. Understanding how things break is prerequisite knowledge for building things that can't.
On metacognition: The loop, when intelligence turns inward, produces rumination. The same intelligence turned outward leads to insight. Same faculty. Opposite direction. Flow state is metacognition without the effort of achieving it. The more you try, the more you lose.
On visibility: 100 skills × 0 visibility = 0 opportunities. Walking only the X axis — learning without building — never tests whether your model of the world is actually correct. Get embarrassed on purpose. It compounds.
On invention: We never actually invented anything. We observed nature and replicated it. From bio-electricity to the light bulb. From neural firing patterns to neuromorphic compute. We don't invent — we remember what the universe already knows. The cosmic inventory was always full. We just keep finding the receipts.
On frequency: Everything is vibrational energy. Sound waves at specific frequencies create tangible geometric patterns on surfaces. The Earth breathes through Schumann resonance. The barrier between matter and energy is thinner than we've built instruments to measure.
These threads — adversarial systems, quantum information, consciousness, the nature of reality — aren't separate interests. They keep resolving into the same questions.
Open to: quantum security research · PQC · adversarial ML · anything at the edge of what's understood.
