Skip to content
View NonsoAmadi10's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report NonsoAmadi10

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
NonsoAmadi10/README.md

Hello! πŸ‘‹ I'm Chinonso Amadi

πŸ” Bitcoin Infrastructure Security Engineer | Confidential Computing & Threshold Cryptography

LinkedIn Twitter GitHub followers

About Me

I build secure Bitcoin custody infrastructure using confidential computing and threshold cryptography.

My background in Site Reliability Engineering gives me a strong foundation for designing production-grade systems that prioritize security, verifiability, and resilience. Now I'm specializing in the intersection of Bitcoin security, Trusted Execution Environments (TEEs), and threshold signatures.

  • 🧰 Current Role: Senior SRE at Bitnob β€” Building Bitcoin & Lightning infrastructure for Africa
  • πŸ” Specialization: Bitcoin custody security, threshold signatures (FROST, MuSig2), confidential computing (AWS Nitro Enclaves)
  • 🧱 Background: Infrastructure security, Kubernetes, cloud architecture
  • 🌍 Location: Lagos, Nigeria β†’ Moving to Kigali, Rwanda (2026)
  • 🎯 2026 Goal: Transition into Bitcoin infrastructure security engineering, specializing in TEE-based custody and threshold cryptography

πŸ’» What I Build

I'm focused on making Bitcoin custody infrastructure secure, auditable, and resilient through the application of confidential computing and advanced cryptographic protocols.

Core Focus:

  • πŸ” Bitcoin Custody Security: Multi-signature coordination, threshold signatures, hardware-backed key management
  • 🧩 Confidential Computing: AWS Nitro Enclaves, remote attestation, secure multi-party computation
  • πŸ”‘ Threshold Cryptography: FROST, MuSig2, distributed key generation (DKG)
  • πŸ›‘οΈ Infrastructure Security: Supply chain hardening, secure build systems, attestation protocols
  • πŸ—οΈ Production Systems: Kubernetes, Terraform, observability, high-availability architecture

Technical Stack:

  • Languages: Rust, Go, Python, Bash
  • Bitcoin/Lightning: Bitcoin Core, LND, rust-bitcoin, Bitcoin Dev Kit (BDK)
  • Cryptography: secp256k1, FROST, Schnorr signatures, PSBTs
  • TEEs: AWS Nitro Enclaves, attestation documents, secure enclaves
  • Infrastructure: Kubernetes, Terraform, Helm, ArgoCD
  • Observability: Prometheus, Grafana, OpenTelemetry

πŸ—οΈ Current Projects

πŸ” Bitcoin TEE Custody Coordinator

Building a production-grade multi-signature coordinator that uses AWS Nitro Enclaves for hardware-backed key protection:

  • FROST threshold signatures (3-of-5, 5-of-7 configurations)
  • Remote attestation for signing operations
  • PSBT workflow with TEE-backed signing
  • Audit logging and key ceremony protocols
  • [Repository Coming Soon]

🧩 Threshold Signature Research

Implementing and comparing threshold signature schemes for Bitcoin:

  • FROST vs MuSig2 trade-off analysis
  • Performance benchmarks and security models
  • Production deployment patterns
  • Read my analysis β†’ [Coming Soon]

πŸ›‘οΈ Bitcoin Infrastructure Security Toolkit

Open-source security templates and threat models for Bitcoin infrastructure:

  • Terraform modules for secure Bitcoin node deployment
  • Kubernetes security standards for custody systems
  • Threat modeling frameworks for Bitcoin companies
  • [Repository Coming Soon]

πŸŽ“ Learning & Research

Currently deep-diving into:

  • Bitcoin Protocol: Script, Miniscript, Taproot, Schnorr signatures
  • Threshold Cryptography: FROST protocol, MuSig2 (BIP-327), verifiable secret sharing
  • Confidential Computing: Nitro Enclave architecture, attestation verification, sealed storage
  • Hardware Security: HSMs (PKCS#11), secure elements, side-channel resistance
  • Production Security: Key ceremonies, disaster recovery, incident response for custody systems

πŸ“š Writing & Talks

I write about Bitcoin security, confidential computing, and production cryptography:

  • πŸ“ Wartime Engineer - Technical deep-dives on Bitcoin custody architecture
  • 🎀 Conference submissions (2026): Bitcoin++, Adopting Bitcoin, TabConf
  • πŸŽ₯ Technical tutorials: Building with Nitro Enclaves, FROST implementation guides

πŸ› οΈ Tech Stack

Rust Badge Go Badge Bitcoin Badge Kubernetes Badge Terraform Badge

AWS

πŸ† Achievements

  • πŸ” Building Bitcoin + Lightning infrastructure at scale serving 100k+ users across Africa
  • 🧹 Led migration of legacy systems to Kubernetes with zero downtime
  • πŸ›‘οΈ Implemented infrastructure security automation and compliance frameworks (PCI-DSS, SOC2)
  • πŸ”­ Built observability pipelines for real-time Bitcoin transaction monitoring
  • 🧠 Currently building production Bitcoin custody systems with TEE backing
  • πŸ“– BTrust Faculty - Teaching Bitcoin protocol development

πŸ“ˆ GitHub Stats

GitHub Stats GitHub Stats GitHub Stats

πŸ’Ό Open to Opportunities

I'm actively seeking roles in:

  • Bitcoin infrastructure security engineering
  • Confidential computing & TEE development
  • Threshold cryptography implementation
  • Custody systems architecture

Interested in: Remote roles at Bitcoin companies, security-focused infrastructure positions, applied cryptography engineering.

🀝 Let's Connect

I'm always open to discussing Bitcoin security, confidential computing, threshold cryptography, or potential collaborations.


Currently building: Bitcoin custody infrastructure with confidential computing Currently learning: FROST threshold signatures, Nitro Enclave development, Bitcoin Script Currently seeking: Remote Bitcoin infrastructure security roles

Pinned Loading

  1. abobi abobi Public

    A go command line tool that parses your environment variables written in a file into a kubernetes base64 encoded secrets

    Go 1

  2. mempool-fee-analysis mempool-fee-analysis Public

    An API and cli that helps users decide what amount of fee to pay for bitcoin transaction based on mempool analysis

    Go 4

  3. Heimdall Heimdall Public

    Heimdall is a monitoring tool designed to help Bitcoin/Lightning node operators keep their nodes up and running by providing real-time information on the performance and availability of their nodes.

    Go 1

  4. jamaljsr/polar jamaljsr/polar Public

    One-click Bitcoin Lightning networks for local app development & testing

    TypeScript 842 170

  5. zwis zwis Public

    An in-memory cache system in Go that supports expirable cache entries and various cache eviction policies including Least Frequently Used (LFU), Least Recently Used (LRU), and Adaptive Replacement …

    Go

  6. terraform-aws-bitcoin-enclave-node terraform-aws-bitcoin-enclave-node Public

    A suite of Terraform/OpenTofu modules that deploy Hardened AWS Nitro Enclave Hosts with integrated OIDC-based CI/CD.

    HCL 1