<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: stonepresto</title><link>https://news.ycombinator.com/user?id=stonepresto</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 09 May 2026 04:14:01 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=stonepresto" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by stonepresto in "I used o3 to find a remote zeroday in the Linux SMB implementation"]]></title><description><![CDATA[
<p>Well, in another subthread the author said he did in fact make a crashing PoC. I guess it depends on the customer's standards, but I would say in the vast majority of cases (especially for nuanced memory corruptions in which the ability to make something exploitable depends on your ability to demonstrate control of the heap) a crashing PoC is the bare minimum. In most VDPs, BBPs, or red team engagements you are required to provide some sort of proof to claim, otherwise you'll be laughed out of the room.<p>I'm curious which sector of infosec you're referring to in which vulnerability researchers are not required to provide proofs of concept? Maybe internal product VR where there is already an established trust?</p>
]]></description><pubDate>Sun, 25 May 2025 21:41:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=44091450</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=44091450</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44091450</guid></item><item><title><![CDATA[New comment by stonepresto in "I used o3 to find a remote zeroday in the Linux SMB implementation"]]></title><description><![CDATA[
<p>I'm too much of a skeptic to not do so lol. Great post though overall, don't let my assholery dissuade you! I was pleasantly surprised that it was actually a researcher behind the news story and there was some real evidence / scientific procedure. I thought you had a lot of good insights into how to use LLMs in the VR space specifically, and I'm glad you did benchmarking. It's interesting to see how they're improving.<p>Yeah race conditions like that are always tricky to make reliable. And yeah I do realize that the purpose of the writeup was more about the efficacy of using LLMs vs the bug itself, and I did get a lot out of that part, I just hyper-focused on the bug because it's what I tend to care the most about. In the end I agree with your conclusion, I believe LLMs are going to become a key part of the VR workflow as they improve and I'm grateful for folks like yourself documenting a way forward for their integration.<p>Anyways, solid writeup and really appreciate the follow-up!</p>
]]></description><pubDate>Sun, 25 May 2025 14:11:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=44087972</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=44087972</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44087972</guid></item><item><title><![CDATA[New comment by stonepresto in "I used o3 to find a remote zeroday in the Linux SMB implementation"]]></title><description><![CDATA[
<p>Thank you! I'm really happy to hear you did that. But why not mention that in your blog post? I understand not wanting to include a PoC for responsible disclosure reasons, but including it would have added a lot of credibility to your work for assholes like me lol</p>
]]></description><pubDate>Sun, 25 May 2025 13:42:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=44087780</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=44087780</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44087780</guid></item><item><title><![CDATA[New comment by stonepresto in "I used o3 to find a remote zeroday in the Linux SMB implementation"]]></title><description><![CDATA[
<p>PoCs should at least trigger a crash, overwrite a register, or have some other provable effect, the point being to determine:<p>1) If it is actually a UAF or if there is some other mechanism missing from the context that prevents UAF.
2) The category and severity of the vulnerability. Is it even a DoS, RCE, or is the only impact causing a thread to segfault?<p>This is all part of the standard vulnerability research process. I'm honestly surprised it got merged in without a PoC, although with high profile projects even the suggestion of a vulnerability in code that can clearly be improved will probably end up getting merged.</p>
]]></description><pubDate>Sun, 25 May 2025 13:38:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=44087751</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=44087751</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44087751</guid></item><item><title><![CDATA[New comment by stonepresto in "I used o3 to find a remote zeroday in the Linux SMB implementation"]]></title><description><![CDATA[
<p>I know there were at least a few kernel devs who "validated" this bug, but did anyone actually build a PoC and test it? It's such a critical piece of the process yet a proof of concept is completely omitted? If you don't have a PoC, you don't know what sort of hiccups would come along the way and therefore can't determine exploitability or impact. At least the author avoided calling it an RCE without validation.<p>But what if there's a missing piece of the puzzle that the author and devs missed or assumed o3 covered, but in fact was out of o3's context, that would invalidate this vulnerability?<p>I'm not saying there is, nor am I going to take the time to do the author's work for them, rather I am saying this report is not fully validated which feels like a dangerous precedent to set with what will likely be an influential blog post in the LLM VR space moving forward.<p>IMO the idea of PoC || GTFO should be applied more strictly than ever before to any vulnerability report generated by a model.<p>The underlying perspective that o3 is much better than previous or other current models still remains, and the methodology is still interesting. I understand the desire and need to get people to focus on something by wording it a specific way, it's the clickbait problem. But dammit, do better. Build a PoC and validate your claims, don't be lazy. If you're going to write a blog post that might influence how vulnerability researchers conduct their research, you should promote validation and not theoretical assumption. The alternative is the proliferation of ignorance through false-but-seemingly-true reporting, versus deepening the community's understanding of a system through vetted and provable reports.</p>
]]></description><pubDate>Sun, 25 May 2025 10:16:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=44086809</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=44086809</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44086809</guid></item><item><title><![CDATA[New comment by stonepresto in "Comcast says hackers stole data of close to 36M Xfinity customers"]]></title><description><![CDATA[
<p>The part of the prompt that suggests its the 15th of December is a GET param, which just means wherever this link was retrieved from is where that date is coming from.<p>The PDF could have been authored at any time.<p>Looks like the created date embedded in the metadata is as follows:<p>2023-12-18T21:21:19.000Z<p>Created with MS Word. But even that isn't definitive.</p>
]]></description><pubDate>Tue, 19 Dec 2023 19:33:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=38700372</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=38700372</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38700372</guid></item><item><title><![CDATA[NVD has deprecated their RSS feed]]></title><description><![CDATA[
<p>Article URL: <a href="https://nvd.nist.gov/general/news/change-timeline">https://nvd.nist.gov/general/news/change-timeline</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=38600357">https://news.ycombinator.com/item?id=38600357</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 11 Dec 2023 13:15:14 +0000</pubDate><link>https://nvd.nist.gov/general/news/change-timeline</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=38600357</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38600357</guid></item><item><title><![CDATA[New comment by stonepresto in "National Crime Agency response to Meta's rollout of end-to-end-encryption"]]></title><description><![CDATA[
<p>Agreed. I think their bottom line probably is built off of how it would affect their user base. My hunch is given the immensity of the user base, it wouldn't cause enough of a significant exodus for Meta to care either way. But that's speculation, not sure if that can be backed up with evidence from past events.</p>
]]></description><pubDate>Fri, 08 Dec 2023 18:28:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=38572392</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=38572392</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38572392</guid></item><item><title><![CDATA[New comment by stonepresto in "National Crime Agency response to Meta's rollout of end-to-end-encryption"]]></title><description><![CDATA[
<p>What's to stop them from having hooks in their app that can bundle up all the decrypted messages, re-encrypt, and phone home? Certainly it wouldn't be default behavior, but its possible and would allow them to answer warrants.</p>
]]></description><pubDate>Fri, 08 Dec 2023 13:28:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=38568760</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=38568760</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38568760</guid></item><item><title><![CDATA[NVD has deprecated their RSS feed]]></title><description><![CDATA[
<p>Article URL: <a href="https://nvd.nist.gov/general/news/change-timeline">https://nvd.nist.gov/general/news/change-timeline</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=38498158">https://news.ycombinator.com/item?id=38498158</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 02 Dec 2023 12:31:32 +0000</pubDate><link>https://nvd.nist.gov/general/news/change-timeline</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=38498158</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38498158</guid></item><item><title><![CDATA[New comment by stonepresto in "Securely Chaining WiFi Routers (2022)"]]></title><description><![CDATA[
<p>I agree WPS is a disaster.<p>My approach is just setting proper firewall rules on a dedicated ESSID with a dedicated VLAN. A device on a restricted VLAN shouldn't be able talk to anything. The downside is its more work, but the plus side is it can be done on trusted firmware (OpenWRT) and not something that would require an entire code audit to determine if there are any logic flaws.</p>
]]></description><pubDate>Sun, 26 Nov 2023 13:37:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=38421489</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=38421489</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38421489</guid></item><item><title><![CDATA[New comment by stonepresto in "Securely Chaining WiFi Routers (2022)"]]></title><description><![CDATA[
<p>This also reads like an advert...<p>I still don't see a usecase for a unique PSK per guest, and even that can be achieved with most guest portal implementations.<p>What SPR seems to lack is backing and therefore trust. Pushing a product aggressively on HN is not the way to build that trust.</p>
]]></description><pubDate>Sat, 25 Nov 2023 13:56:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=38413529</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=38413529</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38413529</guid></item><item><title><![CDATA[New comment by stonepresto in "Building a freedom-friendly WiFi pocket-router (2020)"]]></title><description><![CDATA[
<p>Its important to note their firmware and especially their cloud infrastructure should absolutely not be trusted. Their hardware is probably fine, so just flash OpenWRT.</p>
]]></description><pubDate>Fri, 24 Nov 2023 12:53:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=38403477</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=38403477</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38403477</guid></item><item><title><![CDATA[New comment by stonepresto in "Death by AI – a free Jackbox style party game. AI judges your plans to survive"]]></title><description><![CDATA[
<p>The reponse "<name> tries to... remember they are a god. They are a god. They <do some godlike action to survive>" seems to work very well. But also results in some hilarious deaths.</p>
]]></description><pubDate>Sat, 18 Nov 2023 16:18:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=38321133</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=38321133</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38321133</guid></item><item><title><![CDATA[Ask HN: Non-macOS Target Disk Mode]]></title><description><![CDATA[
<p>First, does anyone know if TDM is implemented in hardware as well as the boot ROM in MBPs, or just the boot ROM?<p>Second, does anyone known of any existing or planned implementations of this outside of the Apple ecosystem?<p>It seems like an immensely useful feature if you work with multiple laptops but want to use the hardware on your desktop computer.</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=38151354">https://news.ycombinator.com/item?id=38151354</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Sun, 05 Nov 2023 14:22:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=38151354</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=38151354</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38151354</guid></item><item><title><![CDATA[Welcome to the New GamersNexus Website v5.0: A Message]]></title><description><![CDATA[
<p>Article URL: <a href="https://gamersnexus.net/gn-extras/welcome-new-gamersnexus-website-v50-message">https://gamersnexus.net/gn-extras/welcome-new-gamersnexus-website-v50-message</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=38145205">https://news.ycombinator.com/item?id=38145205</a></p>
<p>Points: 55</p>
<p># Comments: 33</p>
]]></description><pubDate>Sat, 04 Nov 2023 21:16:11 +0000</pubDate><link>https://gamersnexus.net/gn-extras/welcome-new-gamersnexus-website-v50-message</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=38145205</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38145205</guid></item><item><title><![CDATA[New comment by stonepresto in "Fake recruiter lured aerospace employee with trojanized coding challenge"]]></title><description><![CDATA[
<p>Threat intel and analysis is just like any other analysis, it is taking a heuristic approach to finding answers.<p>Can it be bypassed? Yes.<p>Are the researchers whose entire company hinges on the correctness of their analysis doing their absolute best to attribute the attack to a threat actor? Yes.<p>So to your point, somebody could indeed reuse malware or attempt to replicate it. However, the researchers are likely analyzing the disassembly and bytecode, and replicating complex malware to perfectly imitate a known family of malware is exceptionally difficult and statistically very unlikely. This is how threat intel is able to make any sort of claim of attribution.</p>
]]></description><pubDate>Sun, 01 Oct 2023 10:29:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=37724550</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=37724550</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37724550</guid></item><item><title><![CDATA[New comment by stonepresto in "Infrastructure audit completed by Radically Open Security"]]></title><description><![CDATA[
<p>Up front, I believe Mullvad is the best commercial VPN solution and is doing a great job at making good privacy more accessible.<p>However, a lot of the comments here seem to be hailing VPNs in general as the solution to privacy on the internet.<p>I would like to remind people that VPNs only really protect you against two things: your ISP and the endpoint. And that's assuming that your ISP isn't doing some shady analytics.<p>That being said, knocking those two things off the board is a huge benefit to privacy and absolutely should be done.</p>
]]></description><pubDate>Wed, 09 Aug 2023 11:39:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=37061185</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=37061185</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37061185</guid></item><item><title><![CDATA[New comment by stonepresto in "Infrastructure audit completed by Radically Open Security"]]></title><description><![CDATA[
<p>At some point of paranoia people should really look into selfhosting a VPN service. Sure, your VPS provider can see one side of the traffic so its not bullet proof, but that can be mitigated.<p>Mullvad is a nice middle ground for those who don't see that as worth their time or don't know how. Its good to see they're at the very least trying to keep up appearances.</p>
]]></description><pubDate>Wed, 09 Aug 2023 11:20:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=37061059</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=37061059</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37061059</guid></item><item><title><![CDATA[New comment by stonepresto in "US urged to reveal UFO evidence after claim that it has intact alien vehicles"]]></title><description><![CDATA[
<p>The USA loves aliens. And money. And my money is on this guy being a grifter.</p>
]]></description><pubDate>Tue, 06 Jun 2023 22:56:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=36220239</link><dc:creator>stonepresto</dc:creator><comments>https://news.ycombinator.com/item?id=36220239</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36220239</guid></item></channel></rss>