Core Competencies
Secure Architecture
Threat modeling distributed systems. Security baked in from the first commit.
DevSecOps & Infrastructure
CI/CD pipelines, Docker, Linux internals — manual bottlenecks turned into automated standards.
Technical Leadership
Mentorship, code reviews, and translating business requirements into technical roadmaps.
System Internals & Research
Linux/Android OS internals for performance tuning, debugging, and system hardening.
Posts
Open Source Website Protection
Sep 2025In today's digital economy, robust website security isn't a luxury, it's a necessity. However, for many small and medium sized businesses, the enterprise security market presents a significant barrier. With solutions often carrying five or six figure price tags, comprehensive protection can feel out of reach. But what if you could build a formidable defense without the enterprise budget?
CIR In Depth - How Website Identify Users Without Cookies
Aug 2025Modern websites can track users without cookies by fingerprinting their hardware — GPU rendering, CPU cores, screen resolution, and media devices create a unique identifier that persists across sessions. These techniques, known as Cookieless Identity Resolution (CIR), often operate outside cookie consent banners, creating significant privacy and legal risks for businesses that unknowingly facilitate this tracking through third-party scripts.
Let's connect.
Currently available for consulting engagements and interesting technical challenges.
sergey@grishuk.co.il