How We Built
Varaksha in a Sprint
01
The Problem
02
The Architecture
03
The Outcome
Defining the Architecture
“Demonstrability is a first-class design constraint.”
Defining the Architecture
“Demonstrability is a first-class design constraint.”
Privacy Gateway in Rust
“Sensitive identifiers must not persist beyond the perimeter. Everything downstream operates on hashes.”
Privacy Gateway in Rust
“Sensitive identifiers must not persist beyond the perimeter. Everything downstream operates on hashes.”
ML Baseline Established
“A working baseline yields insights that an unimplemented optimal architecture cannot.”
ML Baseline Established
“A working baseline yields insights that an unimplemented optimal architecture cannot.”
Graph-Based Mule Detection
“Network fan-out is a consistent topological signature across all known money-mule architectures.”
Graph-Based Mule Detection
“Network fan-out is a consistent topological signature across all known money-mule architectures.”
Multilingual Alert Delivery
“A fraud alert has no utility if the recipient cannot read the language in which it is issued.”
Multilingual Alert Delivery
“A fraud alert has no utility if the recipient cannot read the language in which it is issued.”
Integration Proof-of-Concept
“End-to-end verdicts validated — from Rust ingress to multilingual alert.”
Integration Proof-of-Concept
“End-to-end verdicts validated — from Rust ingress to multilingual alert.”
Model Architecture Overhaul
“At 450 MB combined, the ensemble consumed nearly the entire memory budget for a sub-0.005 accuracy gain.”
Model Architecture Overhaul
“At 450 MB combined, the ensemble consumed nearly the entire memory budget for a sub-0.005 accuracy gain.”
Production Deployment
“Static export to a global edge network eliminates cold starts and infrastructure overhead from the demonstration path entirely.”
Production Deployment
“Static export to a global edge network eliminates cold starts and infrastructure overhead from the demonstration path entirely.”
Dataset Coverage Audit
“Model timestamps revealed the training pipeline had never ingested the complete dataset.”
Dataset Coverage Audit
“Model timestamps revealed the training pipeline had never ingested the complete dataset.”
85.24% (V1)
“V1 retraining on the leakage-corrected dataset reached 85.24% accuracy (later superseded by V2).”
85.24% (V1)
“V1 retraining on the leakage-corrected dataset reached 85.24% accuracy (later superseded by V2).”
V1 Finalisation and Deployment
“A deployable system is defined by finishing details—texture, colour, and interactive feedback.”
V1 Finalisation and Deployment
“A deployable system is defined by finishing details—texture, colour, and interactive feedback.”
Gateway Hardening — Rate Limiting & Auth
“A gateway without rate limiting is a door without a lock.”
Gateway Hardening — Rate Limiting & Auth
“A gateway without rate limiting is a door without a lock.”
LightGBM Secondary Model & Feature Expansion
“The ensemble gap that justified removing XGBoost does not apply to a gradient-boosted lightweight.”
LightGBM Secondary Model & Feature Expansion
“The ensemble gap that justified removing XGBoost does not apply to a gradient-boosted lightweight.”
Three-Tier Deployment Architecture
“Cloud, enterprise, and edge are not three products — they are one system at three integration depths.”
Three-Tier Deployment Architecture
“Cloud, enterprise, and edge are not three products — they are one system at three integration depths.”
IsolationForest Calibration & Sweep
“An anomaly detector miscalibrated at 5% contamination flags legitimate high-value merchants every hour.”
IsolationForest Calibration & Sweep
“An anomaly detector miscalibrated at 5% contamination flags legitimate high-value merchants every hour.”
Graph Agent Streaming & Consortium Layer
“Batch topology analysis finds yesterday's mules. Streaming graph analytics finds today's.”
Graph Agent Streaming & Consortium Layer
“Batch topology analysis finds yesterday's mules. Streaming graph analytics finds today's.”
V2 Three-Tier Launch
“One codebase. Three deployment surfaces. One fraud intelligence system.”
V2 Three-Tier Launch
“One codebase. Three deployment surfaces. One fraud intelligence system.”
What We Build Next
All 22 Scheduled Languages
AccessibilityMobile SDK Packaging
DistributionOn-Device Edge Inference
PerformanceStreaming Graph Analytics
ArchitectureLive LLM Legal Summaries
AINPCI Consortium Risk Sharing
EcosystemAutomated Regulatory Reporting
ComplianceOpen-Source Release
Community32 days · 2 people · 3 tiers · shipped.