Steven Foerster

I build security-critical systems where failure is expensive.

I build security infrastructure primitives, product experiments, and research-backed tooling for teams who need resilient systems and trustworthy operational signal.

Products, Tools, and Experiments

Built systems, not services

A personal technical lab focused on scalable primitives, repeatable automation, and security research in the open.

Platform

Vinsium

Zero-trust easy button for secure networks across cloud, office, and home.

Problem class

Unified identity and access across distributed environments.

Explore Vinsium

Security Lab

Client-side crypto tooling

Zero-knowledge patterns, PQC demos, and browser-only encryption.

Problem class

Primitives for protecting data without server-side secrets.

Try the lab

Writing

Architecture and systems notes

Research-backed essays on cryptography, systems design, and failures.

Problem class

Clarity for builders navigating high-stakes systems.

Read the writing

Open Source

Experiments in public

Prototypes, primitives, and research-driven tooling on GitLab.

Problem class

Composable building blocks for secure infrastructure.

Explore GitLab

Focus areas

  • Security infrastructure primitives and automation.
  • High-signal telemetry pipelines and system truth.
  • Research-backed experimentation in applied crypto.

Builder mindset

  • Ship reliable systems before they become liabilities.
  • Prefer automation and primitives over paperwork.
  • Measure truth with telemetry, not opinions.

Current obsessions

  • Client-side encryption patterns and UX.
  • Post-quantum primitives and migration thinking.
  • Composable security infrastructure products.

Proof / Outcomes

Automation impact

Weeks → minutes

Manual work replaced by code

Isolated environments

50+

Secure multi-tenant builds

Telemetry pipelines

200k+ events/day

High-volume signal processing

Featured product

Vinsium

Vinsium is the zero-trust easy button for building secure networks across cloud, office, and home. It keeps identity and access coherent while letting you add modules over time.

Explore products

Focus areas

  • Automation-first primitives
  • Operational signal and drift detection
  • System truth and integrity checks

Featured writing

All posts

Feb 5, 2025

The hidden cost of 'just one more exception'

Exceptions feel harmless in the moment. Over time they become the slow leak that drains security programs.

Read →

Jan 22, 2025

Productizing Infrastructure: what surprised me most

Turning infrastructure into a product is less about technology and more about clarity, ownership, and trust.

Read →

Jan 15, 2025

Security Architecture vs Security Operations: the gap that breaks teams

Security architecture defines the promises; security operations keeps them. When those two drift, the organization pays the bill.

Read →

Reach out if...

I build systems that stay secure under real-world pressure.

  • You're building an infra-heavy product and security/reliability is a blocker.
  • You want a hands-on expert who can jump into code and architecture (not just decks).
  • You're untangling auth, networking, secrets, or multi-tenant boundaries.
  • You're scaling and want to avoid expensive architectural mistakes.
  • You need automation to kill toil and reduce drift.

A few sentences of context goes a long way - see the checklist on the contact page.