As an independent technologist, hacktivist, and security researcher, I am available for both short and long-term contracts to support you or your organization's security and privacy needs. My expertise includes:
- Mobile Security Research: Conducting penetration testing, vulnerability assessments, and reverse engineering to identify and mitigate risks in mobile applications.
- Reverse Engineering: Analyzing software and malware to understand their functionality and uncover potential threats.
- Penetration Testing: Assessing the security of your systems and networks to identify vulnerabilities before they can be exploited.
- Consulting: Providing expert advice on security best practices, privacy protection, and strategies to defend against advanced persistent threats.
My work is driven by a commitment to transparency and user protection, focusing on exposing corporate injustices, governmental abuses, and advocating for decentralization.
I have collaborated with various non-governmental organizations, providing security, privacy, and computer science-based research to support human rights activists, journalists, and individuals at risk from digital threats.
If your organization is seeking a dedicated professional to enhance your security posture and protect against emerging threats, please reach out to discuss how we can work together. You can contact me via email at 0x0v1@proton.me. For secure communication, please use my PGP key available on my website.
As an independent researcher, I value the opportunity to collaborate with organizations that prioritize security, privacy, and human rights.