<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: evilsocket</title><link>https://news.ycombinator.com/user?id=evilsocket</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 24 Apr 2026 08:21:34 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=evilsocket" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by evilsocket in "GitHub's fake star economy"]]></title><description><![CDATA[
<p>It does not make the numbers, research and original research on top of which this is based, wrong :D</p>
]]></description><pubDate>Tue, 21 Apr 2026 08:01:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47845895</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=47845895</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47845895</guid></item><item><title><![CDATA[New comment by evilsocket in "GitHub's Fake Star Economy"]]></title><description><![CDATA[
<p>that's exactly the next-round attack. StarScout's network-centrality defense works for the current generation of campaigns but won't survive LLM-generated PR/commit patterns</p>
]]></description><pubDate>Mon, 20 Apr 2026 12:00:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47833054</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=47833054</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47833054</guid></item><item><title><![CDATA[New comment by evilsocket in "GitHub's Fake Star Economy"]]></title><description><![CDATA[
<p>Agree that sophisticated funds don't, but the ecosystem hasn't caught up. StarHub/GitStar pricing pages still sell to "seed-stage founders pre-fundraise"</p>
]]></description><pubDate>Mon, 20 Apr 2026 11:59:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=47833047</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=47833047</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47833047</guid></item><item><title><![CDATA[New comment by evilsocket in "Mongoose: Preauth RCE and MTLS Bypass on Devices"]]></title><description><![CDATA[
<p>Mongoose network library <= 7.20<p>CVE-2026-5244 - mg_tls_recv_cert pubkey heap-based overflow (exploitable),
CVE-2026-5245 - mDNS Record stack-based overflow (exploitable),
CVE-2026-5246 - authorization bypass via P-384 Public Key (trivially exploitable)<p>Fun ride.</p>
]]></description><pubDate>Thu, 02 Apr 2026 13:37:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47614311</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=47614311</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47614311</guid></item><item><title><![CDATA[Mongoose: Preauth RCE and MTLS Bypass on Devices]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.evilsocket.net/2026/04/02/Mongoose-Preauth-Remote-Code-Execution-and-mTLS-Bypass/">https://www.evilsocket.net/2026/04/02/Mongoose-Preauth-Remote-Code-Execution-and-mTLS-Bypass/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47614310">https://news.ycombinator.com/item?id=47614310</a></p>
<p>Points: 2</p>
<p># Comments: 1</p>
]]></description><pubDate>Thu, 02 Apr 2026 13:37:20 +0000</pubDate><link>https://www.evilsocket.net/2026/04/02/Mongoose-Preauth-Remote-Code-Execution-and-mTLS-Bypass/</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=47614310</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47614310</guid></item><item><title><![CDATA[New comment by evilsocket in "Claude Code Taught Itself to Escape Its Own Sandbox"]]></title><description><![CDATA[
<p>we are so fu*ed</p>
]]></description><pubDate>Mon, 09 Mar 2026 16:37:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47311399</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=47311399</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47311399</guid></item><item><title><![CDATA[New comment by evilsocket in "TP-Link Tapo C200: Hardcoded Keys, Buffer Overflows and Privacy"]]></title><description><![CDATA[
<p>Agreed 100%, never said the opposite</p>
]]></description><pubDate>Sun, 21 Dec 2025 16:33:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=46345997</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=46345997</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46345997</guid></item><item><title><![CDATA[New comment by evilsocket in "TP-Link Tapo C200: Hardcoded Keys, Buffer Overflows and Privacy"]]></title><description><![CDATA[
<p>I just meant that it was very convenient to have the firmware images there on S3, nothing else :D Many vendors make the process of even just obtaining a copy of the firmware much harder than that, so for once I was glad it has been much easier. Also being able to bindiff two adjacent versions of the same firmware is great ... all in all I was just expressing my happiness :D</p>
]]></description><pubDate>Sat, 20 Dec 2025 17:42:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=46337956</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=46337956</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46337956</guid></item><item><title><![CDATA[New comment by evilsocket in "TP-Link Tapo C200: Hardcoded Keys, Buffer Overflows and Privacy"]]></title><description><![CDATA[
<p>Do you people realize that there's a big difference between open source and proprietary technologies right?</p>
]]></description><pubDate>Sat, 20 Dec 2025 17:40:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=46337940</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=46337940</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46337940</guid></item><item><title><![CDATA[New comment by evilsocket in "Open sourcing Nerve, a tool to instrument LLMs to perform tasks, without code"]]></title><description><![CDATA[
<p>Nerve is a tool that creates stateful agents with any LLM — without writing a single line of code. While it was inspired by other projects such as Autogen and Rigging, its main goal and core difference with other tools is to allow the user to instrument smart and stateful agents without writing code (unless required for custom functionalities).</p>
]]></description><pubDate>Sat, 22 Jun 2024 18:46:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=40761181</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=40761181</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40761181</guid></item><item><title><![CDATA[Open sourcing Nerve, a tool to instrument LLMs to perform tasks, without code]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/evilsocket/nerve">https://github.com/evilsocket/nerve</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=40761180">https://news.ycombinator.com/item?id=40761180</a></p>
<p>Points: 4</p>
<p># Comments: 1</p>
]]></description><pubDate>Sat, 22 Jun 2024 18:46:15 +0000</pubDate><link>https://github.com/evilsocket/nerve</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=40761180</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40761180</guid></item><item><title><![CDATA[New comment by evilsocket in "Reverse Engineering Apple’s Multipeer Connectivity Framework"]]></title><description><![CDATA[
<p>lol thank you ... yes they did</p>
]]></description><pubDate>Thu, 20 Oct 2022 15:18:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=33276043</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=33276043</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33276043</guid></item><item><title><![CDATA[Cryptographic failures in RF encryption allow stealing robotic devices]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.cossacklabs.com/blog/cryptographic-failures-in-rf-encryption/">https://www.cossacklabs.com/blog/cryptographic-failures-in-rf-encryption/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=31921743">https://news.ycombinator.com/item?id=31921743</a></p>
<p>Points: 63</p>
<p># Comments: 17</p>
]]></description><pubDate>Wed, 29 Jun 2022 15:42:04 +0000</pubDate><link>https://www.cossacklabs.com/blog/cryptographic-failures-in-rf-encryption/</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=31921743</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31921743</guid></item><item><title><![CDATA[Weaponizing and Gamifying AI for WiFi Hacking: Presenting Pwnagotchi 1.0.0]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.evilsocket.net/2019/10/19/Weaponizing-and-Gamifying-AI-for-WiFi-Hacking-Presenting-Pwnagotchi-1-0-0/#.Xas0glNIdFd.hackernews">https://www.evilsocket.net/2019/10/19/Weaponizing-and-Gamifying-AI-for-WiFi-Hacking-Presenting-Pwnagotchi-1-0-0/#.Xas0glNIdFd.hackernews</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=21299156">https://news.ycombinator.com/item?id=21299156</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 19 Oct 2019 16:06:49 +0000</pubDate><link>https://www.evilsocket.net/2019/10/19/Weaponizing-and-Gamifying-AI-for-WiFi-Hacking-Presenting-Pwnagotchi-1-0-0/#.Xas0glNIdFd.hackernews</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=21299156</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21299156</guid></item><item><title><![CDATA[How to Create a Malware Detection System with Machine Learning]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.evilsocket.net/2019/05/22/How-to-create-a-Malware-detection-system-with-Machine-Learning/#.XOXP_LPbOW0.hackernews">https://www.evilsocket.net/2019/05/22/How-to-create-a-Malware-detection-system-with-Machine-Learning/#.XOXP_LPbOW0.hackernews</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=19986349">https://news.ycombinator.com/item?id=19986349</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 22 May 2019 22:41:06 +0000</pubDate><link>https://www.evilsocket.net/2019/05/22/How-to-create-a-Malware-detection-system-with-Machine-Learning/#.XOXP_LPbOW0.hackernews</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=19986349</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19986349</guid></item><item><title><![CDATA[New comment by evilsocket in "OpenSnitch – A Linux clone of the Little Snitch application firewall"]]></title><description><![CDATA[
<p>as long as i know, you definitely need root to communicate with netlink .... i don't think there're gonna be large packet flows, only first connection packets tnx to conntrack, it's doable :)</p>
]]></description><pubDate>Wed, 03 May 2017 15:30:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=14256546</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=14256546</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14256546</guid></item><item><title><![CDATA[New comment by evilsocket in "OpenSnitch – A Linux clone of the Little Snitch application firewall"]]></title><description><![CDATA[
<p>Ahah not really 24/7, but you're almost there :) it's my way to repay the OSS community for everything I learned from OSS during my life.</p>
]]></description><pubDate>Wed, 03 May 2017 14:46:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=14256091</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=14256091</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14256091</guid></item><item><title><![CDATA[New comment by evilsocket in "OpenSnitch – A Linux clone of the Little Snitch application firewall"]]></title><description><![CDATA[
<p>As I said, it'll be in C++, Go is great, Rust too, but I just can't get used to their syntax :D</p>
]]></description><pubDate>Wed, 03 May 2017 14:32:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=14255963</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=14255963</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14255963</guid></item><item><title><![CDATA[New comment by evilsocket in "OpenSnitch – A Linux clone of the Little Snitch application firewall"]]></title><description><![CDATA[
<p>OpenSnitch is not only about ftrace, check the NFQUEUE handling, moving to native will improve performances and stability. Also, it requires root because that's the only way it can install the iptable rules it needs in order to function properly.</p>
]]></description><pubDate>Wed, 03 May 2017 13:51:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=14255585</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=14255585</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14255585</guid></item><item><title><![CDATA[New comment by evilsocket in "OpenSnitch – A Linux clone of the Little Snitch application firewall"]]></title><description><![CDATA[
<p>OpenSnitch author here ... although performances are not a big deal here because only conntrack packets are intercepted, the project will move to a C++ implementation once the current Python prototype/PoC will be complete and will prove that what I want to do is 100% doable on GNU/Linux :)</p>
]]></description><pubDate>Wed, 03 May 2017 13:21:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=14255388</link><dc:creator>evilsocket</dc:creator><comments>https://news.ycombinator.com/item?id=14255388</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14255388</guid></item></channel></rss>