Security researcher specializing in high-assurance solutions: systems with rigorous design and assurance argument to ensure the failures stay rare plus recoverable. Especially countering subversion or attacks from high-strength attackers. Also, try to dig up and post insights from academic research, CompSci history, and obscure sources.
All of my comments here are licensed under Creative Commons Attribution 4.0 International License. Use and improve on them however you want, free or commercially, so long as you give credit for my contribution. :)