AI Security · Verifiable Systems · Security Strategy

Software is being given authority. Trust must be provable, not assumed.

Available now Discuss an engagement
01 / Security Advisory

Capabilities

  • Verifiable authority
  • AI agent security
  • Applied cryptography
  • Confidential computing
  • Key management
  • Infrastructure security
  • Security strategy
Technologies

AWS Nitro · Intel TDX · AMD SEV
MPC · HSMs · PKI · Attestations
Rust · Python · Go
Reproducible Builds

I work on security architecture for systems where trust needs to be explicit.

That includes applied cryptography, key management, infrastructure security, protocol review, cloud and deployment architecture, blockchain systems, and increasingly AI systems that act through tools, credentials, and external services.

The recurring question is simple: under what conditions should a system be allowed to release authority?

A private key. A signing capability. An access token. A privileged API call. A delegated permission into a system too complex to simply trust.

My current focus is verifiable authority: combining security architecture, cryptographic controls, confidential computing, remote attestation, zero-knowledge proofs, and policy-bound credentials so that high-value actions are constrained, auditable, and defensible.

This applies to AI agents, but not only to AI. It is the same problem behind custody systems, cloud infrastructure, CI/CD pipelines, secrets management, vendor integrations, and critical internal workflows.

Once systems can act, security is not only about preventing compromise. It is about deciding what they are allowed to do, under which conditions, and what they can prove before authority is granted.

02 / Engagements

How we can work together

Ways to start, depending on the depth of the problem.

03 / Current

Current work

Agent credentials · Policy enforcement · Verifiable execution

I'm developing practical frameworks for agent credential control, policy enforcement, and verifiable execution — the missing security layer between increasingly capable AI systems and the real-world authority they are being given.

04 / Track Record
Portrait of Vincent Kobel

Vincent Kobel

Over more than a decade, I have worked on and shipped production systems with high security requirements across cybersecurity, digital assets, applied cryptography, confidential computing, key management, and infrastructure.

I have built security functions from scratch, designed custody and wallet security architectures, supported institutional blockchain and staking infrastructure, and worked with product and engineering teams to turn complex trust assumptions into concrete systems.

2024 — 2026
Kiln
VP Security

Built and owned Kiln's security function from scratch, scaling it to a 7-person team across product security, cloud security, infrastructure security, detection and response, GRC, and security operations. Ran threat modeling, architecture reviews, and trust model design for staking, wallets, and key management systems. Led incident response, audit readiness, and a major security incident from detection through resolution.

2021 — 2024
Blockdaemon
Sr. Director of Security Engineering

Built Blockdaemon's cybersecurity program, then owned wallet product security and digital asset security for MPC, confidential computing, and custody products. Led architecture decisions, roadmaps, and commercial technical discussions, working directly with AWS Nitro Enclaves in production. Initiated and drove the strategic acquisition of Sepior, adding MPC IP and a specialist team to Blockdaemon's custody stack.

2017 — 2021
Metaco
VP of Cybersecurity

Founding team member. Owned security architecture for Harmonize, Metaco's institutional cryptocurrency custody platform, from initial threat model through global launch — protecting billions in digital assets for institutional clients. Designed and implemented across HSMs, PKI, MPC, confidential computing, and containerization. Built specialized tooling in Python and Rust. Helped scale the team to over 30 engineers. Metaco was acquired by Ripple in 2023.

2013 — 2017
Kudelski Security
Security Engineer

Delivered penetration tests, security assessments, applied cryptography, threat modeling, and secure architecture reviews for finance, telecom, critical infrastructure, and high-security event environments, including cybersecurity work supporting the World Economic Forum.