I am currently a software engineer in bay area, with 5+ years of industry experience, and 4+ years of not-very-relevant academic experience. My pronouns are she/her. I dislike photos of myself. I have strong opinions on software development and security/privacy but I value collaboration. I like really interesting and obscure facts, especially pertaining to cultural, culinary, linguistic, and unrelatedly, electronics/computer history.
For fun I work on hobbyist software projects, electronics and 3D printing. I also enjoy cooking and arts/crafts.
Some current projects include building a service to analyze linkages between research papers, a nixie doom clock and some custom housing for the timelapse cameras for my 3D printer. In the future when I move back to Canada, I intend to document my dad’s expertise and work on restoring old TVs/radios.
I have two cats.
I run some Tor relays.
I’m already paid pretty well but if you want to chip in to help support some of this infrastructure/work, you can throw a dollar over on Patreon.
what am i up to
Jan 4, 2020
I wear, or have worn, a number of hats. My title is Software Engineer, but I frequently jump into devops or devsecops or secops or SRE problems. Outside of writing software day to day, my responsibilities also include designing software systems, evaluating security systems and processes, mentoring and advising engineers, and interviewing/screening possible candidates. I am fairly flexible on the tech stack, having experience in the following:
- writing/modifying Linux drivers
- writing operating system core software
- writing highly reliable backend services
- machine learning research
- scaling data pipelines
- web/frontend development
- some minor exploits
- administering Linux servers/systems
- administering PKIs
My research focus in a past life has been on privacy problems relating to big data, namely things like: stylometry and profile-linking problems. I am currently interested in data tracing and protection problems; specifically interested in user credential propagation, and scalable access control techniques on a per-field level as opposed to per-table, per-operation, or per-database level. I am also interested in scalable data identification and redaction techniques, which I find akin on the same difficult as spam identification problems.
I may be reached at s at shh dot sh . My GPG Key is 1BE6 766C DC52 439A 5722 DCA2 BDE4 3806 8A2B D353.
You can also interact with me on Twitter.