Welcome to PrimeWhisper — a blog about cryptography, privacy, and security research.
I’m a security researcher with 12 years of experience in specialized programming and system-level problem solving, 8 of which have been focused on embedded systems and hardware security. I hold an M.Sc. in Computer Science with a focus on Applied Cryptography, covering topics like Private Information Retrieval (PIR) and Secure Multi-Party Computation (MPC). Day to day, I work across the full security research lifecycle: reverse engineering, hardware-level firmware extraction, white-box source code auditing, and custom fuzzing.
This blog is where I write about the things I find most interesting — the intersection of theoretical cryptography and practical security. Expect posts that go deep on the math behind privacy-preserving protocols, as well as writeups on low-level security research, vulnerability analysis, and the occasional tooling deep-dive.
The name PrimeWhisper reflects that duality: the number-theoretic foundations that underpin modern cryptography, and the goal of communicating privately in a world that isn’t built for it.