Hands-on security work
He has strong interests in offensive security, system security, and post-quantum cryptography. Daniel regularly participates in Capture the Flag competitions and security labs, where he analyzes network traffic, reverse engineers binaries, inspects malicious files, and develops custom scripts to automate investigations. He prefers working close to the protocol and system layer rather than relying only on tools.
Alongside competitions, he builds practical systems. He develops web platforms, internal administrative tools, and security-focused applications. His experience includes Linux server environments, cloud infrastructure, databases, deployment pipelines, and secure application design. He values clean architecture and realistic security practices over theoretical assumptions.
Research and long-term direction
In research, Daniel explores topics such as integrating code-based post-quantum cryptography into existing protocols and evaluating the performance and security impact of cryptographic design choices. He is particularly interested in how advanced cryptographic techniques translate into real-world infrastructure.
His long-term goal is to go beyond the label of "white hat hacker." He aims to master code, systems, hardware, and protocols, and to become someone capable of both breaking and building secure technologies with precision.