“Absolutely No Trust Needed”
Welcome to ShinySec[dot]org!
An information assurance and security resource hub by Shiny Sentry.
⬇️ Scroll down to explore my works ⬇️
What is ShinySec?
This is the professional portfolio of Shiny Sentry, an information assurance and security consultant.
ShinySec[dot]org is a professional home for my tools and educational resources, kept distinct from my personal projects. My work focuses on providing trustless, -nym respecting, and libre solutions for the general public, with particular usefulness for marginalized communities and security educators.
If you’d like to learn more about my background, motivations, and the principles guiding my work, you can continue reading below!
-

IA/Infosec Textbook
An open access textbook explaining the fundamental concepts of information assurance and security (IA/IS).
In collaboration with Jennifer Milford of Skarlet Corporation!
-

Unassured Media
Casebooks containing policy snippets exploring common yet critical issues in information assurance and security.
Made for governance, risk, and compliance (GRC) tabletopping! -

Educational Reels
Topical playlists of educational training videos explaining topics in information assurance, security, ethics, and theory.
Created mainly for classrooms, but could be useful anywhere!
Explore >>> -

Sneakernetter Docs
A massive guide to empowering ethical information distribution for hackers, developers, and all other information nerds.
Let’s reject data collection and make better third spaces!
Section 1
Add your pricing strategy. Be sure to include important details like value, length of service, and why it’s unique.
Section 2
Add your pricing strategy. Be sure to include important details like value, length of service, and why it’s unique.
Section 3
Add your pricing strategy. Be sure to include important details like value, length of service, and why it’s unique.
Section 4
Add your pricing strategy. Be sure to include important details like value, length of service, and why it’s unique.
Section 5
Add your pricing strategy. Be sure to include important details like value, length of service, and why it’s unique.
Section 6
Add your pricing strategy. Be sure to include important details like value, length of service, and why it’s unique.
Contact Me
REACH OUT TO ME DIRECTLY
Signal: shinysentry1137.42
Email: shinysentrypublic[at]gmail[dot]com
Got press inquiries? Doing some journalism?
Please read my Press & Media Guidelines first.
Why am I using social media as a security professional? That’s explained in detail here.
Social Media & Portfolios
SEE MY CODE (MIRRORED)
GitHub: @shinysentry1137
Codeberg: @shinysentry1137
SEE MY ARTWORK (MIRRORED)
ArtStation: @[coming soon]
Pixiv: @[coming soon]
Apologies in advance if I take several days to reply, I answer all communications in the order that I got them!
Are you hosting a cybersecurity event in the Tampa Bay area? If you’re interested in booking me as a guest speaker, please contact me at least one month in advance and carefully read my Event Guidelines beforehand.
Trusted Partners
Skarlet Corporation
Offering tailored IT solutions, management, cybersecurity, and data recovery for small businesses!
Owner Jennifer N. Milford specializes in industry standard frameworks, security training, advanced configuration, and more. She’s featured here as a trusted partner and friend I often collaborate with for security research and community education. Learn more about her work below.