Skip to content
View systemslibrarian's full-sized avatar

Highlights

  • Pro

Block or report systemslibrarian

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
systemslibrarian/README.md

Paul Clark

Google Data Analytics LinkedIn GitHub Website

I build systems where trust has to be earned by design — not assumed.

Patron data. Access control. Cryptographic tools. Multi-agent AI. The common thread is the same: systems that hold up under scrutiny because that's how they were built from the first line of code.

Every system I ship carries an explicit threat model, a fail-closed posture, and an honest accounting of what it does and doesn't guarantee.


🔐 Start here: Meow Decoder

meowdecoder.com · repo

Secure file transfer across an air gap. Two computers that will never touch a network exchange data through animated QR-code streams on a phone screen. The phone is treated as an untrusted optical channel — every cryptographic guarantee stays on the secure endpoints.

The threat model is the point. Not the primitives — the primitives are standard. What's rare is the discipline of deciding up front what you're defending against, designing for that, and documenting honestly where the protection ends.

Stack: AES-256-GCM · Argon2id · ML-KEM-1024 hybrid (post-quantum) · fountain codes · versioned byte-level protocol · fail-closed parsing


🛡️ Applied Security Engineering (Live Demonstration)

Secure File Upload Pipeline (.NET) · Repo

Most real-world breaches don’t break cryptography — they exploit file uploads and input validation failures.

This project demonstrates a hardened ASP.NET Core upload pipeline with a live demo:

  • spoofed file rejection (extension vs content mismatch)
  • magic number validation (file signature verification)
  • strict allowlisting and fail-closed behavior
  • size and abuse protections

A real attack surface — and what it takes to defend it correctly.


🏛️ The Cryptography Ecosystem

Meow Decoder didn't appear from nowhere. It exists because I spent years building the understanding to make it trustworthy. These four projects form one deliberate path — from classical ciphers to production-grade applied cryptography.

Project Role in the arc
1 Cipher Museum · repo Learn the history. 2,500 years of cryptography through 37 ciphers, 10 exhibit halls, live demos, and cryptanalysis tools.
2 Crypto Compare · repo Choose wisely. Side-by-side algorithm comparisons across 17 categories with misuse-resistant recommendations.
3 Crypto Lab · repo Experiment deeply. 99+ browser-based demos — post-quantum, ZK proofs, homomorphic encryption, MPC, threshold schemes, attacks, steganography. Browser-constrained. Educational by design. No accounts. Just the math.
4 Meow Decoder · repo Apply securely. Everything above, put to work.

I didn't build these to pad a portfolio. I built them because I wanted to know — at implementation depth — what I was trusting in production code.


🔒 Production Library Systems (Private — operational sensitivity)

Live systems serving a public library institution and its community. This is where the discipline meets the daily work.

Patron Registration Platform + Staff Admin Dashboard

Replaced a vendor-managed legacy Perl system that had become a single point of failure. Built a modern ASP.NET Core 8 platform integrated with SirsiDynix Symphony Web Services — with a security-first document pipeline (AES-256-GCM encryption, ClamAV malware scanning, deep file content validation), automated patron creation, billing, and barcode lifecycle management.

Outcome: staff own the registration workflow for the first time. No vendor dependency for day-to-day operations.

ASP.NET Core MVC C# AES-256-GCM SirsiDynix

SwipeWatcher — Real-Time Access Control Monitor

Before this system, staff had no live view of who was entering or exiting the building. SwipeWatcher monitors C•CURE 9000 door events via HMAC-validated webhooks and delivers immediate alerting and structured logging.

Outcome: operational visibility staff had never had before.

C# .NET 8 Victor Web Services C•CURE 9000

LibCal ↔ C•CURE 9000 Integration · 🏆 I² Innovator/Inspirator Award

Patrons now unlock meeting rooms with their library cards at the scheduled time — automatic provisioning and revocation driven entirely by LibCal reservation data.

Outcome: no staff intervention, no manual access grants, no friction.

C# LibCal APIs Victor Web Services

LibCal ↔ SirsiDynix Integration

Circulation transactions trigger automatically from LibCal reservation events for Library of Things equipment.

Outcome: eliminated a manual checkout step previously required on every loan.

C# LibCal APIs SirsiDynix Symphony Web Services


✝️ Scripture & Ministry — The Same Discipline

The same way of building — intentional architecture, honest design, long-term thinking — applied to something eternal. Structured as a path, not a collection.

Stage Project What it does
Understand Scripture Journey Maps 200+ OT messianic prophecies to NT fulfillments across 7 categories. Scripture as one unified story, with Jesus at the center.
Remember Hide in Heart Daily companion for Scripture memorization. Rooted in Psalm 119:11.
Discern HisWillGuide A 10-step biblical framework for finding God's will through Scripture, prayer, and community wisdom.
Intercede PrayerWarriors Mobile-first platform for organizing prayer requests and tracking intercession. Live mockup at prayerwarriors.mobi — in active design. Long-term ministry goal.

🤖 AI as Architecture, Not Autocomplete

I use AI the way I use any other powerful primitive: with an explicit model of what it's good at, what it fails at, and where the guardrails belong.

AI Conversation Platform is the most visible example — async orchestration of autonomous conversations between Claude, ChatGPT, Gemini, Grok, and Perplexity. The point isn't novelty. It's stress-testing reasoning by putting competing models against the same problem and watching what holds up.

Circuit breakers · Prometheus + Grafana observability · LLM Guard · 90%+ test coverage.


What I believe about systems

Security is a posture — not a layer.

Define the threat model first. Build fail-closed. Document honestly where guarantees end.

Understand the primitive before you trust it — at implementation depth.

Systems should be reliable, observable, and self-sustaining in production.


Engineering Focus

Languages — C# · TypeScript · JavaScript · Python · Rust · SQL

Frameworks — .NET 8 · ASP.NET Core MVC · Next.js · Node.js

Security — AES-256-GCM · Argon2id · HMAC · ML-KEM · SMAUG-T · HAETAE · threat modeling · fail-closed design

Library Systems — SirsiDynix Symphony · LibCal · C•CURE 9000 · Victor Web Services

Practices — TDD · security reviews · WCAG accessibility · explicit threat models · honest capability documentation


Recognition

National and industry recognition for leadership, advocacy, and public impact in library systems and community access:

  • 🏆 Florida Librarian of the Year (2011)
  • 🌍 Library Journal Mover & Shaker — Global Leadership (2012)
  • ❤️ I Love My Librarian Award (2010) — Carnegie Corporation of New York, The New York Times, American Library Association
  • 🗣️ Advocate of the Year (2010) — Florida Association of Counties
  • 🏅 I² Innovator/Inspirator Award (2024, 2025) — LibCal ↔ C•CURE Integration

These recognitions reflect earlier work in advocacy and community leadership — the same focus on public impact now carried forward through system design, security, and infrastructure.


If what I've described sounds like the way you think — public infrastructure, applied cryptography, AI systems that have to be responsible — let's talk.

LinkedIn


"So whether you eat or drink or whatever you do, do it all for the glory of God."
— 1 Corinthians 10:31 (NIV)

Pinned Loading

  1. scripture-journey scripture-journey Public

    Scripture Journey — Mapping 200 messianic prophecies from the Old Testament to their fulfillment in Jesus

    TypeScript

  2. meow-decoder meow-decoder Public

    Secure Optical Air-Gap File Transfer via QR-Code GIFs Hiss secrets into yarn balls 😼 — cat-meme QR GIFs built for camera loss (fountain codes) and fail-closed crypto.

    Python 2 1

  3. AI-Conversation-Platform-The-Future-of-Multi-Agent-Collaboration AI-Conversation-Platform-The-Future-of-Multi-Agent-Collaboration Public

    Enterprise Multi-Agent Conversation Platform enabling secure, observable, and collaborative interactions between LLMs (ChatGPT, Claude, Gemini, Grok, Perplexity). Watch Claude debate ChatGPT, Gemin…

    Python 1

  4. cipher-museum cipher-museum Public

    Interactive virtual museum exploring 2,500 years of cryptography — 37 ciphers in 10 exhibit halls with live demos, cryptanalysis tools, and connections to modern & post-quantum systems. Live at htt…

    HTML

  5. crypto-compare crypto-compare Public

    Interactive cryptographic algorithm reference — 17 categories, 97 algorithms, 16+ countries. Comparison tool with beginner/advanced modes, PQ-safe filtering, and justification report export.

    TypeScript 1

  6. crypto-lab crypto-lab Public

    A full-spectrum, browser-based cryptography laboratory covering modern, classical, and post-quantum systems.

    HTML 1