Slava Solodkiy.today dual‑use defence tech • digital identity x biometrics • OSINT/compliance/EDD • resilient energy x AI compute
LONDON • UK / GLOBAL Defence × Civil Resilience Digital Identity × AML/EDD Edge AI × Energy Sovereignty

Building “boring‑reliable” systems for chaotic worlds.

I write, prototype, and advise at the intersection of digital identity, compliance/AML, OSINT, and resilient infrastructure—with a dual‑use lens.

Core thesis: The future of AI (and national resilience) is built on identity, sovereignty, and infrastructure that still works when the map breaks.

Thesis

What I believe • and why it matters

Digital identity is the new (programmable) money—and the missing layer for AI‑era governance, compliance, and resilience. I focus on identity systems that can operate across borders, sanctions, and fragmentation, bridging traditional KYC/AML with decentralized identity primitives.

Dual‑use framing: build civilian‑first systems that also harden national resilience— verification, fraud detection, attribution, and infrastructure that degrades gracefully.
Practical north star: reduce systemic risk, not just ship features.

In parallel, I research AI (and energy) sovereignty as infrastructure. Centralized “sovereign clouds” are brittle; distributed/edge architectures can be harder to map, more resilient by design, and economically aligned with prosumer hardware trends.

Capabilities

What I do (hands-on + strategic)
  • Concept → prototype → narrative: define the system, the threat model, the constraints, and the “why now”.
  • Compliance-native product thinking: KYC/KYB, AML/EDD, sanctions reality, financial crime + identity fraud dynamics.
  • OSINT awareness: how adversarial ecosystems shape defensive requirements (identity, fraud, compliance).
  • Edge AI packaging: local inference, secure enclaves, offline-first patterns, resilient deployments.
  • Gov/defence ecosystem mapping: funding and integration strategy (UK innovation pathways, procurement posture).
  • Power stations brownfield: resilient deployments for AI data-centers and dual-use defence-shelters.
  • First-Order Logic approach: FOL-languages enthusiast..
  • AI sovereignty: requires distributed compute—many nodes, harder to map, resilient by nature. Built for prosumer + civil resilience ecosystems.
  • Additive defence: survivability infra civil defence: printed fortifications + sensing/filtration/control loops that can be produced locally and upgraded into an intelligent system.

Selected work

Flagship threads • public artefacts

identity.global DID and biometrics

Reusable identity infrastructure: reduce repeated KYC friction, enable portability, harden verification in a post‑deepfake world.

Fintech, regtech / VC operator track builder + investor

Background spanning regulated fintech + venture activity (Life.SREDA & Arival). Useful when translating R&D into fundable, regulated, procurement-ready products.

Research threads (dual‑use)

What I’m exploring right now

Strongest clusters (high signal, low fluff): the threads that translate into programmes, prototypes, procurement, or advisory value.

Decentralized AI data centres = real AI sovereignty

Evidence-led argument that decentralization is the real sovereignty path; inference is feasible; prosumer hardware is at critical mass.

OSINT & EDD threat realism economic crime

Model adversarial ecosystems as a compliance requirement: threat intel, fraud detection, identity abuse, KYC evasion patterns.

Secure edge station bundles deployable

Packaging edge compute + secure services (local LLMs, APIs, hardening): a practical deployment unit for identity, OSINT, and resilience use cases.

DefenceTech VC go‑to‑ecosystem

How to enter defence/security innovation globally.

UK defence innovation integration go‑to‑ecosystem

How to enter UK defence/security innovation, align to calls, and convert research → adoption.

Power station brownfield

Energy & AI infrustructure sovereignty. Dual-use as defence-shelters.

Defense.Engineering

Robotics x 3D Printing x AI x Genetics for Dual-Use DefenceTech.

Rule of thumb for dual‑use: the best projects are “civilian valuable, defence critical” — where the commercial market finances iteration, and the defence market buys resilience.

Lab notes (WIP)

Selected drafts • filterable

A curated set of ongoing research directions. These are “signal probes”: constraints, architectures, market dynamics, policy/ethics — then translated into prototypes, pilots, or venture theses.

Filter All Sovereign compute Sovereign energy&power Resilience Standards Ethical Justice & Values-Based Business Photonics DNA-computing WIP

Resilience & protected infrastructure: shelters ↔ secure services ↔ continuity

dual‑use infrastructure WIP

Treat “shelter” as an engineering stack: physical barrier + life-support subsystems + operational doctrine. The boundary is where data centers, secure facilities, and civil defence converge.

  • Life-support is central: ventilation/filtration, overpressure, CO₂ removal, backup power & manual modes.
  • Standards bridge: security controls vs availability vs survivability.
  • Demand signals: threat-driven adoption and “hardening by default” premium builds.

Photonics for sovereign compute: packaging is the bottleneck

R&D hardware WIP

Photonics isn’t “pure optical” — it’s hybrid integration + manufacturable packaging. The point is energy + bandwidth scaling under constraints.

  • CPO roadmap and reducing conversion overhead.
  • Photonic wire bonding as 3D “bridges of light”.
  • Packaging design rules as industrialization lever.

Preparedness economy: segmentation, adoption curves, procurement logic

market intel WIP

A lens for civil defence & continuity: the market splits into “recreational readiness” (mass) vs “existential threat” (deep spend). Useful for product strategy and procurement narrative.

  • Two-market model: wide low-intensity vs narrow high-intensity buyers.
  • Signals: EDC scaling vs shelter/life-support specialization.
  • Forecast framing to sanity-check TAM/SAM/SOM.

Justice-tech / inmate ventures: talent pipelines, ethical rails, ecosystem design

ecosystems WIP

Mapping venture funding, reentry programs, and prison-adjacent tech. Focus: incentives, training rails, and ethics-by-design in “captive markets”.

  • Dedicated funds + founder stories → investable pattern recognition.
  • Support orgs + training programs → scalable talent conversion.
  • Explicit ethics & market power concerns surfaced early.

Timeline (compressed)

Builder → operator → frontier research
Regulated fintech + banking infrastructure 12+ years

Compliance-native product work; payments/fintech systems; bridge between regulation and shipping.

Venture / ecosystem building Life.SREDA • Arival

Founder/operator + investor lens: how products scale, how teams execute, how narratives convert.

Digital identity + proof-of-personhood = programmable money

Reusable identity thesis; ecosystem mapping; linking identity to AI-era trust, fraud, and governance.

Defence-adjacent resilience research AI & Energy Sovereignty

Decentralized compute sovereignty; survivability infrastructure; edge AI as “civil defence hardware”.

Now / roles

Pick a lane • or blend lanes

Researcher / R&D futurist concept→prototype

Build and validate dual‑use concepts, threat models, and prototypes—especially in identity, OSINT, and edge AI deployments.

Co-Founder (dual‑use defencetech) company build

Start a product vehicle around resilience infrastructure (identity + OSINT + deployable edge compute), with a grant/procurement pathway.

Advisor / mentor / VC operator ecosystem

Support teams and funds with positioning, diligence, product strategy, and “how it fails” risk thinking in regulated / security contexts.

What I don’t do boundaries

I don’t provide instructions to build harmful systems. My work is defensive/resilience-focused: attribution, fraud prevention, secure deployment, compliance, civil protection.

Ping me

Fastest way to start

If you’re hiring or building in dual‑use defence tech (identity, OSINT/EDD, secure edge AI, resilience infra), send a short brief:

  • Mission + customer (who buys, who uses)
  • Threat model (what breaks / who attacks / what you must assume)
  • Constraints (regulatory, procurement, deployment, export controls if any)
  • What you need from me (R&D, founder track, advisory, diligence)

All contacts are here: https://l.solodkiy.cv/calendly

One-liner: I build compliance-native, resilience-first systems where identity + infrastructure meet adversarial reality.