I’m sponsored on GitHub now!

Please consider being one of my supporters, and your name will be on my site at my $25 tier level.

Your sponsorship helps me continue to contribute. It helps offset the costs of getting to conferences, and pay for hosting and other promotional expenses associated with my projects.

Support Me


Source Code Audits

A software code audit is a comprehensive analysis of source code in a programming project with the intent of discovering bugs, security breaches or violations of programming conventions.

Medical Device Hacking

Experience in finding vulnerabilities in devices like power-wheelchairs, fitbits, pacemakers, and more.


Enjoys public speaking at information security events. Presented at DEFCON, GeekPWN, Kaspersky SAS and counting…


Built webapps using the latest backend webstacks


Built webapps using the latest frontend webstacks

Cloud Providers

Experience deploying web based applications to a cloud hosting provider such as AWS and Heroku



Chief Security Officer


May 2020 – Present
Tech Slayers is an innovative and expanding tech company pioneering processes and systems in tech education, business communication, cyber-security, and NIST compliance.

Chief Information Security Officer


Jun 2019 – Present Cluj, Romania
Risktronics is a cybersecurity company based in Cluj (Romania), focused on Vulnerability Research & Penetration Testing

Chief Executive Officer

Omega Intelligence & Security Solutions

Dec 2016 – Nov 2019

Cyber Security Consultant


Dec 2016 – Present

Contract Software Engineer


Jun 2016 – Dec 2016
SpiderOak’s new product Semaphor uses my libsodium-go library. Semaphor is an open sourced alternative for Slack

Computer Security Intern

Metropolitan State University of Denver

May 2014 – Dec 2016

Customer Service Representative

Metropolitan State University of Denver

May 2012 – Dec 2014

Volunteer Experience

IEEE Member

I’m in the working group: IEEE P2733, Standard for Clinical Internet of Things (IoT) Data and Device Interoperability with TIPPSS.

This standard establishes the framework with TIPPSS principles (Trust, Identity, Privacy, Protection, Safety, Security) for Clinical Internet of Things (IoT) data and device validation and interoperability. This includes wearable clinical IoT and interoperability with healthcare systems including Electronic Health Records (EHR), Electronic Medical Records (EMR), other clinical IoT devices, in hospital devices, and future devices and connected healthcare system.

CTO Member

Currently acting on the board. I handle all technology concerns and upgrades.

Solid State Depot is Boulder’s Hackerspace: a physical place where like-minded people get together and collaborate on creative projects. We were founded in July 2010 and moved into our first space a few months later in November. Sometimes referred to as a Makerspace, Makershop, or shared workspace, the Boulder Hackerspace is a space which functions as both a workshop and a place to hold our meetings. Here we explore art and technology and support each other in developing creative ideas/plans/toys/inventions/madness!


Certified Bitcoin Professional - CBP

A Certified Bitcoin Professional is knowledgeable about the Bitcoin blockchain, Bitcoin transactions, and how the Bitcoin network operates. CBPs are able to apply Bitcoin technology to their professional area of expertise and understand privacy aspects, double-spending, and other issues that relate to the currency.
See certificate

Grow with Google - Intermediate Mobile Web Track Scholarship

A way to focus your skills by taking specialized Udacity courses. The top 10% will have access to jobs and networking opportunities.

Kaspersky SAS 2017 Presenter

Power-wheelchairs could potentially infect anything in their path, leading to global fear that any device can be hacked and be used against anyone. Chairs are excellent malware vectors because they have Bluetooth which allows to attack nearby devices. Crafty internet access can be achieved using 6LoWPAN, so one can download new exploits to the chair’s memory. Then use those exploits against any kind of Bluetooth-enabled device. Chairs are recent IoT devices and they can hide exploits in plain sight. Presented possible ways to implement malware in chairs.

Geekpwn 2016 Presenter

I presented more attacks and overall security of power-wheelchairs
See certificate

DEFCON 24 IoT Village presenter: Hot Wheels: hacking electronic wheelchairs

I reverse engineered a closed and proprietary protocol that relied on the CAN standard called R-Net for power wheelchairs. I showed how easy it was to inject standard CAN messages to take full control of chairs with R-Net electronics. I provided some basic open source tools to allow people to customize their chairs more easily.
See certificate

Recent Posts

I’m being sponsored on GitHub now. I do most of my work here. People can directly sponsor me including you. Please share the link …

The next generation of hacking tools using blockchains: part 1

The Internet is an ocean of data which is an advantage as well as a disadvantage. Pros are that the internet is free and accessible to …