Simplifying
the KERI Suite

I design and implement practical trust architectures based on KERI etc.,
with optional hybrid extensions that work alongside existing X.509 PKI to add continuity and verifiability.

Events flowing through the KERI infrastructure

Consulting Services

• KERI • ACDC • KEL • TEL • CESR • X.509 PKI •

KERI / ACDC Architecture

  • Architecture design for verifiable, continuous identities
  • Modeling event provenance and credential structures
  • Integrating KERI/ACDC into existing systems

Hierarchical Trust Models

From Design to Deployment

  • Turning trust models into executable logic
  • Preparing systems for real-world operation
  • Ensuring clean rollout and predictable behavior

About Me

I am Michal and I work on the parts of the internet most people never see: identity continuity, event logs, cryptographic migration paths, and the systems that connect them.

If something must remain trustworthy tomorrow, I design how it works today.