Bit Veil in a grey hoodie with a mask

BIT_on_Tech™

Curious by design. Veiled by choice.

BIT_on_Tech™ is the signature I publish under. Bit Veil is the veil itself.

I work where electronics, software, radio, sensors, and systems meet reality — often in the grey areas where things are rarely ever just black and white. Not malicious. Not reckless. Just curious, analytical, and willing to open systems to understand how they truly work.

I’m drawn to systems that don’t fully explain themselves: undocumented behavior, edge cases, and the layers you only see when you look beneath the surface. My core belief is simple: “Everything can be analyzed, everything can be understood—if you have the courage to open the lid.”

For me, freedom means being able to inspect, trace, reverse, and reason about a system — not to break it, but to know it. I operate methodically, but I don’t rely solely on manuals. Some paths aren’t documented. Some answers require going upstream.

Understanding systems by looking beneath the surface.


Core competencies

Selected focus areas

Gray-hat / reverse engineering
Electronics
power • signal tracing • boards schematics • fault isolation
Embedded Systems
MCU • peripherals • bare-metal minimum systems • bring-up
PCB & Circuit Design
schematics • layout • signal integrity analog/digital interfacing
Reverse Engineering
protocols • behavior • edge cases firmware & device analysis
Low-level Code
machine code • assembly C toolchains • debugging
Programming
C • Python • PHP automation • tooling
Radio & RF
amateur radio (A license) • RF technique antennas • field practice
Cellular / LPWAN
GSM • LTE-M • NB-IoT device integration • telemetry links
Networking
routing • segmentation • services reliability • observability
Telemetry Pipelines
MQTT • logging • data paths storage • dashboards
Security Mindset
hardening • threat thinking gray-hat reverse engineering
Testing & Verification
measurement • repeatability QA gates • validation
More focus areas Click to expand
Cryptography
keys • hashing • signatures practical application
Auth & MFA
sessions • tokens • 2FA flows secure-by-default patterns
APIs & Endpoints
REST • webhooks • clients edge cases • integration
Databases
SQL • schema • tuning logging • retention
Device Buses
SPI • I²C • UART bring-up • debugging
Processor Architecture
datasheets • timing • peripherals constraints • performance
Direction Finding
DF • tracking • field work signal intuition
Radar Systems
speed measurement • modern units signal chains
Documentation & handover
maintainability • technical notes system explanation • human translation
Production Delivery
packaging • release discipline real-world constraints

I don’t actively seek projects, and I don’t operate as a consultancy. I engage selectively, when a problem is technically interesting, well-defined, and personally sustainable. If something resonates, I’m open to a conversation.

All messages are read manually. Replies depend on relevance, clarity, and whether I have the capacity to engage with the problem at the right depth.

Mail
  • Preferred for introductions and technical context.
  • Name is only expected when using mail.
SMS
  • Reserved for short, time-critical matters.
  • Include essential contact details in the 150 characters.
max 1500 chars
max 150 chars
1500 chars left