Case studies and active work designed for real conditions: instability, coercion risk, low trust, low bandwidth, low energy. Each entry links to a dossier surface (problem → constraints → method → proof → outputs).
Local-first systems, privacy-sensitive architecture, threat modeling, audit outputs, and degraded-mode design.
Use search + tags to find relevant operating conditions and threat boundaries.
Minimization-first chronic pain tracking PWA. Local-first by default. Explicit export instead of ambient sharing.
A reproducible trust case that reduces unearned claim surface through a pinned specimen, drift detection, verifier coverage, and a hosted-green release path.
A layered discipline for systems built under instability: theory → operations → measurement.
Threat modeling + remediation written for adversarial reality (not compliance theater).