If it can be built, consider it done. If not, even better.
10:42 AM
Building at the frontier of trust-minimized computation. Six years across decentralized protocol design, zero-knowledge cryptography, and cyber security grounded in computer science theory and the mathematical structures that make it all work.