FTFY
Cyber Defense
What we do

We find and fix unsolved problems in security.

Portfolio 3 bets
01
"turn your attack surface into a detection surface."
an experimental open source deception framework that helps developers detect attackers who probe API business logic. By embedding realistic decoy routes and honey fields that are difficult to distinguish from real API constructs, attackers are nudged to authenticate — converting reconnaissance into actionable security telemetry.
Live
02
"Trust in software should be measurable, not assumed."
Software trust evaluation platform. Five criteria — security, confidentiality, availability, processing integrity, privacy — applied as one standard across every application in your stack.
Live
03
Undisclosed
A new bet in cyber defense. We'll talk when it's ready.
2026