Skip to content
View Trust-Worthy's full-sized avatar
🎯
Focusing
🎯
Focusing

Highlights

  • Pro

Block or report Trust-Worthy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Trust-Worthy/README.md

 Trust-Worthy 

▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
 [INIT] Privacy-First Systems Engineer
 [MODE] Building tech that doesn't betray its users
 [STAT] Trust is foundational, not optional
▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓

Philosophy

Systems are only as strong as the trust they uphold.

I build privacy-preserving, security-conscious software. Your data shouldn't be training someone else's model. Your network shouldn't be locked in someone else's platform. Code is power—but trust is the protocol.

Python C Rust Swift JavaScript HTML CSS Bash Java Dart Jupyter MongoDB SQLite

Arsenal

[Low-Level & Sec]    C • Rust • x86 Asm • IDA Pro • GDB • OpenSSL • Wireshark
[AI & Data Science]  Python • Transformers • Ollama • OpenCV • Weaviate • ArcGIS
[App Development]    Swift • Dart • Java • JavaScript • Flask • Docker
[Core Tools]         Bash • Git • Xcode • Jupyter • Linux

Expertise

root@Trust-Worthy:~# tree -L 2 skills/
.
├── Security_Engineering
│   ├── Malware Analysis
│   ├── Vulnerability Research
│   └── Network Crypto
├── Privacy_AI
│   ├── Local LLMs (Ollama)
│   ├── Semantic Search
│   └── Ethical & Private AI
├── App_Dev
│   ├── iOS (Swift)
│   ├── Flutter
│   └── Open Source
└── Intelligence
    ├── OSINT
    ├── GIS / Geospatial
    └── Technical Writing


Mission Statement

▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
 Build software that defends users, not exploits them.
 
 Privacy:     Non-negotiable
 Security:    Hardened by design
 Trust:       Earned through transparency
▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓

Code is power. Trust is the protocol.

Pinned Loading

  1. LinkedOut-Cactus LinkedOut-Cactus Public

    LinkedOut: The privacy-first networking brain that runs 100% on your device.

    Dart

  2. mega-foss-Trust-Worthy mega-foss-Trust-Worthy Public

    Forked from VulnerabilityHistoryProject/mega-foss

    Scripts for acquiring our MegaFoss dataset - a curated list of top open source projects that represent modern software development

    Jupyter Notebook

  3. ZeroOTP ZeroOTP Public

    ZeroOTP — A privacy-first, open-source TOTP authenticator app built in Swfit with zero trust principles.

    Swift

  4. OpenBWC/openbwc-datakit OpenBWC/openbwc-datakit Public

    Scripts for OpenBWC open source data collection.

  5. ClubFair ClubFair Public

    ClubFair is a web app that helps college students organize their weekly schedules and discover campus clubs that fit into their availability — removing the guesswork from getting involved.

    JavaScript

  6. Flix-Feed Flix-Feed Public

    Simple iOS app to view movies from the TMDB API.

    Swift