Skip to content
CCCrisisCore Systems
CrisisCore Systems

About

Founder-led product review for teams handling health and other sensitive user data.

Independent systems designer. Based in Vernon, BC.

I work with founders and technical owners who need a clear read of the product itself: architecture, defaults, privacy behavior, recovery paths, and operational risk.

Why this exists

Products can fail users before they fail technically

Many products run fine but still fail people at the edges: hidden collection, unclear boundaries, weak recovery paths, or claims that do not hold up under pressure.

I find those weaknesses early, explain them plainly, and turn them into fixes a team can ship.

This is service work first: review, correction, and implementation support.

Operating principles
  • Privacy is architecture, not a policy page.
  • Product boundaries need to be explicit, not implied.
  • Critical flows should survive low attention, low bandwidth, and bad conditions.
  • Evidence matters more than sales language.
  • Find the highest-leverage fix first, then ship it.
What I do (and don’t)
Do
  • Privacy and product risk reviews for live or near-launch products.
  • Threat modeling and risk framing that matches real constraints.
  • Architecture review with explicit boundary and minimization decisions.
  • Implementation guidance and fix support when changes need to ship.
Don’t
  • Sell compliance checklists as proof of product safety.
  • Hide weak decisions behind vague language.
  • Treat policy or marketing copy as a substitute for product behavior.
  • Take on work where nobody can act on the findings.
Founder identity banner for CrisisCore Systems
Founder profile

Independent practitioner focused on local authority, degraded-mode behavior, and evidence a buyer can inspect.

Founder profile

Founder of CrisisCore Systems. Independent consultant based in Vernon, BC. I review software systems for privacy and product risk, with a bias toward evidence a buyer can inspect without a sales call.

Canonical profiles

Use these to verify public identity across code and DOI-backed records.

About mission plate graphic for CrisisCore Systems
Mission plate

Open the case-study route first, then continue into proof materials, source records, and operating claims.

Open case-study route
Engagement

I work best asynchronously and artifact-first. A short written context, a few constraints, and links beat a long call.

If coercion risk, compromised devices, legal exposure, or health-adjacent data are in play, say so early. That changes the review from the start.

Operational note: avoid sending sensitive personal data by email. If you need a safer channel, say so in the first message.
If you’re evaluating
  • Start with Services for package fit and starting prices.
  • Go to the case-study route first, then Proof for artifacts, outcomes, and technical evidence.
  • Use Contact when you are ready to send the app, launch stage, and concern.