<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: tjbecker</title><link>https://news.ycombinator.com/user?id=tjbecker</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 02 May 2026 10:26:31 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=tjbecker" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by tjbecker in "Copy Fail"]]></title><description><![CDATA[
<p><a href="https://x.com/i/status/2049687923814281351" rel="nofollow">https://x.com/i/status/2049687923814281351</a><p>> and yes, RHEL 14.3 doesn't exist  We meant to say RHEL 10.1. Sorry for the confusion!</p>
]]></description><pubDate>Thu, 30 Apr 2026 03:18:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47957675</link><dc:creator>tjbecker</dc:creator><comments>https://news.ycombinator.com/item?id=47957675</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47957675</guid></item><item><title><![CDATA[New comment by tjbecker in "Copy Fail"]]></title><description><![CDATA[
<p>For this crowd, I highly suggest checking out the technical writeup<p><a href="https://xint.io/blog/copy-fail-linux-distributions" rel="nofollow">https://xint.io/blog/copy-fail-linux-distributions</a></p>
]]></description><pubDate>Wed, 29 Apr 2026 20:37:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47954254</link><dc:creator>tjbecker</dc:creator><comments>https://news.ycombinator.com/item?id=47954254</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47954254</guid></item><item><title><![CDATA[New comment by tjbecker in "Copy Fail"]]></title><description><![CDATA[
<p>This is correct. The container escape exploit and writeup is not yet released.</p>
]]></description><pubDate>Wed, 29 Apr 2026 20:36:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47954238</link><dc:creator>tjbecker</dc:creator><comments>https://news.ycombinator.com/item?id=47954238</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47954238</guid></item><item><title><![CDATA[New comment by tjbecker in "Copy Fail"]]></title><description><![CDATA[
<p>I recommend reading the technical writeup
<a href="https://xint.io/blog/copy-fail-linux-distributions" rel="nofollow">https://xint.io/blog/copy-fail-linux-distributions</a></p>
]]></description><pubDate>Wed, 29 Apr 2026 20:33:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47954184</link><dc:creator>tjbecker</dc:creator><comments>https://news.ycombinator.com/item?id=47954184</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47954184</guid></item><item><title><![CDATA[New comment by tjbecker in "Autonomous code analyzer beats all human teams at OSS zero-day competition"]]></title><description><![CDATA[
<p>This is fair, and we will gladly share the extraordinary evidence as soon as we can.<p>If you're curious, we have already released the full traces of finding a sqlite3 0day with an early version of Xint Code (submitted to the AIxCC competition and now open sourced): <a href="https://theori.io/blog/exploring-traces-63950" rel="nofollow">https://theori.io/blog/exploring-traces-63950</a></p>
]]></description><pubDate>Wed, 17 Dec 2025 02:15:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=46297447</link><dc:creator>tjbecker</dc:creator><comments>https://news.ycombinator.com/item?id=46297447</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46297447</guid></item><item><title><![CDATA[New comment by tjbecker in "Autonomous code analyzer beats all human teams at OSS zero-day competition"]]></title><description><![CDATA[
<p>In the commenter's defense, it's reasonable to be skeptical about the level of autonomy claimed in the post.<p>We are very eager to share more evidence (including the raw inputs and output artifacts for these bugs) and will absolutely do so as soon as we can.</p>
]]></description><pubDate>Wed, 17 Dec 2025 02:09:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=46297390</link><dc:creator>tjbecker</dc:creator><comments>https://news.ycombinator.com/item?id=46297390</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46297390</guid></item><item><title><![CDATA[Autonomous code analyzer beats all human teams at OSS zero-day competition]]></title><description><![CDATA[
<p>Article URL: <a href="https://theori.io/blog/announcing-xint-code">https://theori.io/blog/announcing-xint-code</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46283305">https://news.ycombinator.com/item?id=46283305</a></p>
<p>Points: 8</p>
<p># Comments: 4</p>
]]></description><pubDate>Tue, 16 Dec 2025 00:53:41 +0000</pubDate><link>https://theori.io/blog/announcing-xint-code</link><dc:creator>tjbecker</dc:creator><comments>https://news.ycombinator.com/item?id=46283305</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46283305</guid></item><item><title><![CDATA[No, it doesn’t just crash Safari. Apple has yet to fix exploitable flaw]]></title><description><![CDATA[
<p>Article URL: <a href="https://arstechnica.com/gadgets/2021/05/exploitable-security-bug-remains-in-ios-and-macos-3-weeks-after-upstream-fix/">https://arstechnica.com/gadgets/2021/05/exploitable-security-bug-remains-in-ios-and-macos-3-weeks-after-upstream-fix/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=27295927">https://news.ycombinator.com/item?id=27295927</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 26 May 2021 20:50:47 +0000</pubDate><link>https://arstechnica.com/gadgets/2021/05/exploitable-security-bug-remains-in-ios-and-macos-3-weeks-after-upstream-fix/</link><dc:creator>tjbecker</dc:creator><comments>https://news.ycombinator.com/item?id=27295927</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27295927</guid></item><item><title><![CDATA[New comment by tjbecker in "Remote Code Execution in Slack desktop apps"]]></title><description><![CDATA[
<p>> Sure, but that isn’t the user’s fault, and they’re the ones who are going to get attacked.<p>This is true, but the responsibility to protect these users is ultimately on Slack, not the researcher. If Slack's bounties are nowhere near competitive with black market prices, they are failing to protect their users and should be called out on it.</p>
]]></description><pubDate>Sat, 29 Aug 2020 21:18:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=24319513</link><dc:creator>tjbecker</dc:creator><comments>https://news.ycombinator.com/item?id=24319513</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24319513</guid></item></channel></rss>