I Was Targeted by a DPRK-Linked Supply Chain Attack via LinkedIn. Here's Exactly How It Worked.
How I caught and documented a sophisticated nation-state supply chain attack targeting developers through LinkedIn.
Cards with have an interactive demo — flip to try.
How I caught and documented a sophisticated nation-state supply chain attack targeting developers through LinkedIn.
Multi-agent coordination protocol where autonomous agents self-organize into delivery swarms and settle payments on-chain.
Orca: filling the gap between Coolify and Kubernetes. Rust-native, GPU-aware, AI ops baked in.
The architecture choices behind a self-hosted restaurant OS that replaces expensive SaaS POS systems.
KitchenAsty: online ordering, reservations, and kitchen ops in one self-hosted admin panel.
ETO GRUPPE TECHNOLOGIES GmbH · Stockach, Germany
Leading a team of 10 developers across IoT, embedded, and web platforms. Technical due diligence for M&A, patent management, GDPR/MiCA/DORA/AML compliance, and driving architectural modernisation across product lines.
ETO GRUPPE TECHNOLOGIES GmbH · Stockach, Germany
Managed cross-functional teams, sprint planning, and capacity planning for grant projects. Led etopay-sdk — multi-platform Rust payment SDK with WASM, mobile, and native FFI bindings — from design to production.
ETO GRUPPE TECHNOLOGIES GmbH · Stockach, Germany
Built embedded Linux services, gRPC microservices, and cryptographic tooling (MPC, SSS, Threshold Crypto, DID/VC). Managed IoT fleet PKI using PKCS#11 with NitroKey and cloud HSM.
SysDesign GmbH · Stockach, Germany
System architecture and development for industrial IoT applications. REST and gRPC service design, AWS/Azure cloud infrastructure, Prometheus/Grafana monitoring stacks.
Larsen & Toubro Limited · Mumbai, India
Embedded software development for industrial automation and control systems.
Filed as inventor · ETO GRUPPE TECHNOLOGIES GmbH
Datenbereitstellungsverfahren, Sensornetzwerk und Sensor
Trustworthy data provisioning for connected devices — foundational for agent telemetry
Content-Management-Prozess, Content-Management-System, Metaverse und Computerprogrammprodukt
Decentralised content coordination in virtual environments
Verifizierungsverfahren und Verifizierungscomputersystem mit einem NFT-Erzeugungsgerät
On-chain verifiable attestations for physical objects
Kryptografisches Verfahren und durch das kryptografische Verfahren gesicherte verwahrte oder nicht verwahrte Geldbörse
Wallet security primitives applicable to agent custody infrastructure
Verfahren und System für den Waren- und/oder Posttransport
⊛ The SwarmHaul protocol — patented three years before the hackathon
Three AI-generated ambient music channels, each engineered for a different headspace. Auto-selects based on your local time of day.
Orchestral drama & dark ambient for writers, filmmakers, and storytellers.
Cinematic BGMListen on YouTubeGritty house, techno & deep beats engineered for deep work and focus.
Functional House MusicListen on YouTubeRaga-inspired wordless vocals and Indian classical soundscapes.
Indian Vocal SoundscapesListen on YouTubeSecurity is practice, not a badge. Here's what I actively maintain.
Define thundering herd in the context of a web server. Name two kernel/userspace mechanisms that prevent it.