Skip to content
View Trust-Worthy's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report Trust-Worthy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Trust-Worthy/README.md

Hey, I'm Jonathan — aka Trust-Worthy

Gratitude

None of my accomplishments are mine alone. I’m deeply grateful to God and to the incredible people who’ve shaped my journey. If you’re reading this, take a moment to appreciate those who’ve helped you along yours.

Interdisciplinary problem solver | Open Source Contributor | Security Researcher

What I Do

I explore and build at the intersection of open source software, cryptography, cybersecurity, anthropology, data science, criminology, and ethical AI. The most interesting problems rarely fit neatly into one box.

Who I Work With

The best, brightest, and most passionate people I meet. Every great project is built by a great team.

Why I Do It

Tackling difficult, undefined problems is how I serve others with creativity. It’s challenging, meaningful, and worth doing.

Why You Should Care

The world needs more diverse, interdisciplinary teams. We’ve gotten too comfortable in our own corners of academia, business, and tech. True innovation happens when different skill sets, experiences, and perspectives collide.

How You Can Help

  1. Find a real-world problem that affects you and people different from you.
  2. Gather a team of diverse, gifted individuals.
  3. Start building—whether it’s a startup, a research project, or something entirely new.

What I Study

Applied Math, Computer Science, Cybersecurity, and Anthropology

Technical Proficiencies

Languages: Python, Java, C, Rust, Swift, Bash Security & RE Tools: Linux, IDA Pro, Wireshark, GDB, Valgrind AI/ML: PyTorch, Whisper Data & GIS: ArcGIS, Jupyter, MongoDB Version Control: Git, GitHub Mobile OS: iOS


Where I’m Applying My Studies

Vulnerability research, secure software development, network security, and machine learning for criminology.

Future Focus Areas

Post-quantum cryptography, human trafficking prevention, internet privacy, and Linux kernel development.

Why Cybersecurity & Anthropology?

People often ask, "Why both?"

Technology doesn’t exist in a vacuum. The social sciences help contextualize cybersecurity, AI, and software within human culture and behavior. The more we understand people, the better we can build secure, ethical, and impactful technology.


Outside of Tech

I love cinematography, filmmaking, and capturing artists in their flow state. Creativity, in any form, is a way to express our most authentic selves.

Let’s build something meaningful together.

Pinned Loading

  1. mega-foss-Trust-Worthy mega-foss-Trust-Worthy Public

    Forked from VulnerabilityHistoryProject/mega-foss

    Scripts for acquiring our MegaFoss dataset - a curated list of top open source projects that represent modern software development

    Jupyter Notebook

  2. P-VCR P-VCR Public

    Patch Vulnerability Commit Reconciliation

    Python

  3. From_Desert_2_Oasis From_Desert_2_Oasis Public

    This is a python project that analyzes and eliminates food deserts.

    Jupyter Notebook

  4. Fire-Simulation Fire-Simulation Public

    Fire Simulation Algorithm and cmd line visualization in C

    C

  5. Covert_Channels Covert_Channels Public

    Creating packet parser for Neural Network to identify covert channels.

    Python

  6. SHA-40 SHA-40 Public

    Adaptation of the popular SHA-256 hashing algorithm. This hashing algorithm uses 40 bytes instead of 256 bytes.

    C