
Orie Steele
Strategy, Architecture, Development
Austin, TX
We will build a better world together.
- Scaling cyber-physical teams while avoiding AI psychosis
- Giving supply chains a memory, a conscience, and an immune system
- Empowering people and organizations to own and control their digital identity
Passion & Experience
Agentic Software Development Lifecycle
Teaching product and engineering teams to work alongside AI agents at every stage — research, design, validation, and development. Organizations ship faster when their people know how to lead hybrid human-agent teams.
Information & Operational Security
Preparing enterprises for post-quantum digital signatures and encryption. Building habits and rituals around secure software development, delivery, and maintenance.
Supply Chain Security
Protecting organizations from the cascading risks of fragmented & volatile global supply chains. Equipping organizations with the evidence-based assurance that their products are composed of legitimate materials, sourced from verified origins, secured through an unbroken chain of responsibility, and authorized for market.
Career Highlights
Industry Leadership
- VP Engineering· TradeverifydWe give brands the supply chain clarity to do what's right.
Tradeverifyd is a trade intelligence platform that uses agentic AI to help customers answer questions about their supply chain, identify and respond to emerging risks, and comply with trade regulations. We make it easier than anyone else.
- Co-Founder & CTO· Transmute IndustriesVenture-backed supply chain security startup
Built the engineering team and product that turned international standards into enterprise software for trade compliance and supply chain transparency. Secured venture funding and delivered products adopted by government and Fortune 500 customers.
Standards Leadership
Member of the Internet Engineering Steering Group (IESG), the body responsible for final approval of all internet standards. Oversees the Applications and Real-Time area, guiding the working groups that define how software communicates across the internet.
Facilitate, manage and support the working group that defines how applications use encrypted connections. These guidelines protect user data in email clients, web browsers, and messaging apps worldwide.
Facilitate, manage and support the working group focused on making public key distribution transparent and auditable, preventing impersonation attacks in end-to-end encrypted messaging.
Standards Publications
Defines how to label signed data so systems can process it correctly. Adopted globally by software that needs to verify the authenticity of messages and documents.
Creates a universal fingerprint for security keys, making it easy to identify and match keys across different systems without sharing sensitive data.
Eliminates ambiguity in how security algorithms are specified, reducing implementation errors that lead to vulnerabilities in production systems.
The foundational web standard for digital identity that doesn't depend on a single company or government. Used by organizations building portable, user-controlled identity systems.
Enables organizations to revoke or suspend digital credentials at scale while preserving privacy. Essential for any system issuing verifiable documents like licenses, certifications, or permits.
Open Source
Go library for signing and encrypting data used across the cloud native ecosystem. Trusted by major vendors for securing software supply chains and attestation workflows.
TypeScript library for creating and resolving decentralized identifiers from cryptographic keys. Used by developers building portable digital identity systems.
JavaScript implementation of the Sidetree protocol for scalable decentralized identity networks. Enables thousands of identity operations anchored to a single blockchain transaction.