Email-first. Engagements typically map to: Trust Hardening Review, Hardening Sprint, or Fractional Trust Architect support.
Fastest path: email. Include context, constraints, and any repo or deployment links; I’ll reply with next steps and whether the engagement looks like a fit.
Context: - What you are building and who it serves Need: - Trust Hardening Review / Hardening Sprint / Fractional Trust Architect Constraints: - Timeline - Budget range - Security or compliance boundaries Artifacts: - Repo / docs / deployment links Decision target date: -
I aim to respond within 1–3 days. If you’re in an urgent window, put URGENT in the subject line and include your deadline.
I prefer verifiable artifacts over long calls: a short description, constraints, and links beat a meeting.
If your environment includes coercion risk, compromised devices, or legal exposure, say so early. We’ll treat threat boundaries as first-class.
Protective computing is constraint-led. “Normal” assumptions are optional.
If the email button doesn’t open a client on your device, use this form to generate and send your inquiry via webmail.