Simplifying
the KERI Suite

From design to implementation, I translate KERI and ACDC into practical, long-term solutions that strengthen identity, continuity, and verification.

Events flowing through the KERI infrastructure

Consulting Services

• KERI • ACDC • KEL • TEL • CESR •

KERI / ACDC Architecture

  • Architecture design for verifiable, continuous identities
  • Modeling event provenance and credential structures
  • Integrating KERI/ACDC into existing systems

Hierarchical Trust Models

From Design to Deployment

  • Turning trust models into executable logic
  • Preparing systems for real-world operation
  • Ensuring clean rollout and predictable behavior

About Me

I am Michal and I work on the parts of the internet most people never see: identity continuity, event logs, cryptographic migration paths, and the systems that connect them.

If something must remain trustworthy tomorrow, I design how it works today.