One human · public-interest AI security research

Small lab.Serious safety work.

Entropy Shield is a nonprofit, independent research and development side project focused on practical AI security, local-first defensive tooling, and plain-language guidance for people trying to keep systems safe.

This is not a venture-backed cybersecurity company.

It is one person building research prototypes, writing guides, and sharing tools in the open because AI systems are moving fast and the world needs more careful, grounded security work.

Build practical defenses for a messier AI future.

AI security should be understandable, inspectable, and usable by real IT teams — not hidden behind marketing claims or vendor dashboards. Entropy Shield exists to turn research questions into small working tools, checklists, and local-first prototypes that improve safety without demanding blind trust.

What this is

A nonprofit research side project

Entropy Shield is a public-interest effort to explore AI governance, prompt security, post-quantum readiness, and defensive automation.

What this is not

Not a giant vendor

No sales team. No enterprise theater. No claims that a prototype is magic. Just careful R&D, honest status labels, and useful artifacts.

Why it exists

Safer systems, fewer blind spots

The aim is to help people understand risk earlier, keep sensitive data local, and make AI adoption less chaotic.

Small tools with clear boundaries.

These are active R&D efforts. Some are working prototypes, some are research sketches, and all are labeled plainly so the status is clear.

Research design

AI Governance Framework

codename: ENTROPY

A lightweight assessment model for understanding where AI systems create operational risk: visibility, containment, governance, and response. The goal is to help teams ask better questions before automation becomes unmanageable.

  • Maps AI workflows, data movement, and human review points.
  • Prioritizes controls that are observable and testable.
  • Designed for local documentation and audit preparation.
  • Focused on practical governance, not policy theater.
In development

Detection Log Analyzer

codename: WATCHFLOOR

A local report generator for turning endpoint detection logs into clearer narratives: what happened, what likely matters, what should be checked next, and what evidence supports each conclusion.

  • Summarizes noisy security logs into analyst-readable findings.
  • Extracts indicators, suspicious command lines, and timeline clues.
  • Uses local processing where possible to protect sensitive evidence.
  • Marks confidence levels instead of pretending certainty.
Study track

Post-Quantum Readiness Notes

codename: LATTICE NOTES

A research track for understanding quantum-safe migration, cryptographic agility, and how organizations can prepare without fearmongering or unsupported claims.

  • Focuses on readiness, inventory, and migration planning.
  • Avoids “encrypt once, safe forever” overclaims.
  • Tracks standards-aligned post-quantum approaches.
  • Written for defenders who need clear next steps.

The design rules are boring on purpose.

Good security work should be legible. These constraints keep the project honest.

01

Tell the truth about status

A prototype is a prototype. Research is research. The labels should make that obvious.

02

Keep sensitive data local

Prompts, logs, recordings, and reports should stay on systems the user controls whenever possible.

03

Help humans decide

AI can assist analysis, but human judgment, context, and accountability stay central.

04

Prefer useful artifacts

Checklists, scanners, notes, examples, and reports beat vague claims and dramatic dashboards.

A practical Zoom security checklist.

A simple guide for reducing avoidable meeting risk — written for normal people, not just security teams.

Free resource

Your Zoom meetings may be more exposed than you think.

Meeting security does not need to be complicated. A few defaults — waiting rooms, unique IDs, host-only sharing, careful recording settings, and bot awareness — prevent many common mistakes.

Before the meeting

  • Use a unique meeting ID instead of a permanent personal meeting room.
  • Enable a passcode and waiting room for sensitive calls.
  • Set screen sharing to host-only until you intentionally change it.

During the meeting

  • Check the participant list for unfamiliar names, phone numbers, or AI notetaking bots.
  • Lock the meeting once expected participants have joined.
  • Share a specific window instead of your entire desktop.

After the meeting

  • Move recordings to approved storage with proper permissions.
  • Delete recordings you no longer need.
  • Rotate IDs for recurring meetings when the audience changes.

Building quietly, sharing what helps.

Entropy Shield is a one-person nonprofit R&D effort. Reach out with thoughtful feedback, collaboration ideas, responsible testing notes, or practical security problems worth researching.

Email Peter