From Documents to Defensible Claims: Rethinking Document Systems

Most document systems are built for storage and extraction.

That is the wrong goal.

In high-trust environments, the real job is not to collect documents or parse fields. It is to determine whether the available evidence actually supports a claim.

That is a different system.

Organizations generate endless documentation: invoices, contracts, certifications, logs, reports, statements, attestations.… Read more

Designing Resilient Scheduled Payment Systems

Scheduled financial transfers sound simple. A customer creates an instruction — for example, “transfer $100 every week” — and the system processes the transaction on the appropriate day.

Many systems begin with a straightforward implementation. A daily job reads instructions from a database, generates transactions, and attempts to process them. For a small system this can work well enough.… Read more

Vault encryption, an upgrade

Note (2026): This was written while I was actively working with Vault. My current stack leans more toward AWS-native solutions (KMS, Secrets Manager, IAM), but the core concepts here—separating secrets from code and treating encryption as a service—still apply.

In my last post, I discussed using the Spring Encryption project to encrypt sensitive data in our application.… Read more

Moving JWT from headers to cookies

One thing that’s been nagging me as we build out our framework is how we’re handling JWTs. Right now, we’re doing what most applications do. The token comes back after authentication and gets sent on every request in the header:

GET http://localhost:8080/someprotectedendpoint
Authorization: Bearer <jwt token>

This works exactly as expected.… Read more

Cognito to rule them all?

After writing custom code to handle signing up users, sending emails, supporting multi-factor authentication, I looked more into alternatives. Why? As a startup you have to be scrappy. Use what’s free, create solutions for platform parts that cost too much for where you’re at. Eventually, you will grow out of this and will need to look at alternatives.… Read more

MFA (Take Two)

It’s been a while since I’ve written a post. I’ve been heads down working on the platform thinking more about use cases, revising code and introducing a basic React client. If I haven’t mentioned already, I love IntelliJ. It’s my tool of choice and have been using it for years. Every time they make a release they introduce something cool that is helpful.… Read more

Multi Factor Authentication

Multi factor authentication has become ubiquitous in web applications. If you work in financial services it’s even a legal requirement in some states. For most of us working professionals I believe we all agree enhanced security for our customers is a good thing. While we have already tackled broader approaches, such as encryption and server hardening, we also want to cover more fine grained approaches that affect an individual’s experience.… Read more