When you're a whole on the internet
Most of us exist online as a jigsaw puzzle scattered across a table. A LinkedIn profile. A Bluesky account. An old Twitter handle. A forum username from 2009. The pieces
Most of us exist online as a jigsaw puzzle scattered across a table. A LinkedIn profile. A Bluesky account. An old Twitter handle. A forum username from 2009. The pieces are all there, but assembling them takes work, and that friction, it turns out, has been doing a lot of
Built for Access: How Brazil's Identity System Opened a Door It Wasn't Designed to Close
Part 1 of 2. This piece covers the history of digital identity in Brazil and the data infrastructure that made industrial scale fraud possible. Part 2 covers how fraud co-evolves
Part 1 of 2. This piece covers the history of digital identity in Brazil and the data infrastructure that made industrial scale fraud possible. Part 2 covers how fraud co-evolves with digital infrastructure, and what that means for every country building digital infrastructure for identities today. We tend to talk
Age verification, verifiable credentials, and the privacy tension rising from the debate
I left a job in March 2025 after years of engineering and researching privacy and identity at the forefront of the KYC industry, more specifically with biometrics and liveness identification.
I left a job in March 2025 after years of engineering and researching privacy and identity at the forefront of the KYC industry, more specifically with biometrics and liveness identification. KYC is the infrastructure built to verify who someone is before granting them access to a transaction. That same year,
Build It and They'll Come: How Fraud Co-Evolves with Digital Infrastructure
Part 2 of 2. Part 1 covered the history of digital identity in Brazil and the data infrastructure that made industrial-scale fraud possible. This piece examines why fraud doesn't attack
Part 2 of 2. Part 1 covered the history of digital identity in Brazil and the data infrastructure that made industrial-scale fraud possible. This piece examines why fraud doesn't attack weak systems, but good ones, and what that means for every country building digital public infrastructure today. There is a