knowledge center · field notes from production
Threat intelligence. Engineering deep-dives. Architectural arguments.
Citable, dated, no marketing. Notes from running execution evidence at scale across African and emerging-market estates — every claim grounded in a deployment, a spec section, or a field observation.
- published
- 3 entries live today
- categories
- 2 active threat intelligence · engineering
- earliest
- 2025·03 first entry on file
threat-intelligence operations · notes from production
- 2025·07 ⚠⚐
threat intelligence
How advanced malware from Asia is targeting Africa's financial sector
Threat report. Overlay attacks, accessibility-service abuse, GoldFactory expansion, device takeover fraud.
READ →
- 2025·06 { }
engineering
Network context, DNS, and zero-rating
Module note: parallel resolver racing, DNS-over-HTTPS, and zero-rating compatibility for African fintech.
READ →
- 2025·03 { }
engineering
Defensive JNI for low-end Android
Open-source Semgrep rule set capturing defensive JNI patterns developed for production deployment across 12,000+ Android device configurations.
READ →
Some knowledge lives in the spec, not on the open site.
The agentic-payment extension, the formal threat model, and the conformance checklists ship inside YEI-001 — shared with regulators and qualifying partners under NDA.
Request access