<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: tylerni7</title><link>https://news.ycombinator.com/user?id=tylerni7</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 02 May 2026 13:06:50 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=tylerni7" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by tylerni7 in "Copy Fail"]]></title><description><![CDATA[
<p>because we're a company and we want to make money to continue to fund cool research, and help our customers secure their software :)</p>
]]></description><pubDate>Wed, 29 Apr 2026 22:27:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47955554</link><dc:creator>tylerni7</dc:creator><comments>https://news.ycombinator.com/item?id=47955554</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47955554</guid></item><item><title><![CDATA[New comment by tylerni7 in "Copy Fail"]]></title><description><![CDATA[
<p>yeah... definitely a bit of a rush to get the landing page out after a long time in the disclosure process. The folks putting this all together have been working like mad (finding the bug, disclosing, working a lot on patching, writing up POCs and verifying exploitability in different scenarios) and stayed up really late to finish up the landing page, which led to a lot of minor issues.<p>But the bug is real and people should patch :)<p>For the size: sometimes people will shove in kilobytes of offset tables or something into an exploit, so it'll fingerprint and then look up details to work. This is much smaller because it doesn't need any of that, which is important for severity. (I agree the "golf" nature is a bit of an aside, kind of like pwn2own exploits taking "10 seconds")</p>
]]></description><pubDate>Wed, 29 Apr 2026 20:39:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47954283</link><dc:creator>tylerni7</dc:creator><comments>https://news.ycombinator.com/item?id=47954283</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47954283</guid></item><item><title><![CDATA[New comment by tylerni7 in "Copy Fail"]]></title><description><![CDATA[
<p>ugh sorry should be fixed. There was some scrambling to get more info together to explain the issue (and yes, obviously marketing), so there are some minor mistakes. Thanks for pointing it out!</p>
]]></description><pubDate>Wed, 29 Apr 2026 20:29:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47954142</link><dc:creator>tylerni7</dc:creator><comments>https://news.ycombinator.com/item?id=47954142</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47954142</guid></item><item><title><![CDATA[Building LLM Agents for Hacking]]></title><description><![CDATA[
<p>Article URL: <a href="https://theori.io/blog/building-effective-llm-agents-63446">https://theori.io/blog/building-effective-llm-agents-63446</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45015631">https://news.ycombinator.com/item?id=45015631</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 25 Aug 2025 16:29:33 +0000</pubDate><link>https://theori.io/blog/building-effective-llm-agents-63446</link><dc:creator>tylerni7</dc:creator><comments>https://news.ycombinator.com/item?id=45015631</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45015631</guid></item><item><title><![CDATA[The brain of a 0day finding hacking bot]]></title><description><![CDATA[
<p>Article URL: <a href="https://theori.io/blog/exploring-traces-63950">https://theori.io/blog/exploring-traces-63950</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44890865">https://news.ycombinator.com/item?id=44890865</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 13 Aug 2025 16:53:57 +0000</pubDate><link>https://theori.io/blog/exploring-traces-63950</link><dc:creator>tylerni7</dc:creator><comments>https://news.ycombinator.com/item?id=44890865</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44890865</guid></item><item><title><![CDATA[What we learned building AI hacker agents]]></title><description><![CDATA[
<p>Article URL: <a href="https://theori.io/blog/building-effective-llm-agents-63446">https://theori.io/blog/building-effective-llm-agents-63446</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44889791">https://news.ycombinator.com/item?id=44889791</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 13 Aug 2025 15:32:08 +0000</pubDate><link>https://theori.io/blog/building-effective-llm-agents-63446</link><dc:creator>tylerni7</dc:creator><comments>https://news.ycombinator.com/item?id=44889791</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44889791</guid></item><item><title><![CDATA[Lessons learned building an AI hacker]]></title><description><![CDATA[
<p>Article URL: <a href="https://theori.io/blog/building-effective-llm-agents-63446">https://theori.io/blog/building-effective-llm-agents-63446</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44878568">https://news.ycombinator.com/item?id=44878568</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 12 Aug 2025 16:28:24 +0000</pubDate><link>https://theori.io/blog/building-effective-llm-agents-63446</link><dc:creator>tylerni7</dc:creator><comments>https://news.ycombinator.com/item?id=44878568</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44878568</guid></item><item><title><![CDATA[New comment by tylerni7 in "North Korean ICBM launch detected using GPS"]]></title><description><![CDATA[
<p>The main protocol is called NTRIP. Lots of sources make it available (though it might be annoying to stream from ~250 simultaneously, not sure). There's a lot if you search that term though.<p>I think GEONET (the Japanese data source) might have some NTRIP casters. Also some in Korea and elsewhere. Sometimes you have to pay for access though, so I need to look more.</p>
]]></description><pubDate>Mon, 28 Nov 2022 02:24:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=33769164</link><dc:creator>tylerni7</dc:creator><comments>https://news.ycombinator.com/item?id=33769164</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33769164</guid></item><item><title><![CDATA[New comment by tylerni7 in "North Korean ICBM launch detected using GPS"]]></title><description><![CDATA[
<p>Thanks! It's mostly just been for fun, lots of academic work has already shown the principles of it.<p>I'm glad folks are looking at it, and enjoying it! If you have questions or anything let me know! :)</p>
]]></description><pubDate>Mon, 28 Nov 2022 00:23:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=33768438</link><dc:creator>tylerni7</dc:creator><comments>https://news.ycombinator.com/item?id=33768438</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33768438</guid></item><item><title><![CDATA[New comment by tylerni7 in "North Korean ICBM launch detected using GPS"]]></title><description><![CDATA[
<p>Oh hey I wrote this!<p>Yeah, we had a detector with some ML stuff, it worked okay, but the main issue is there isn't much training data.<p>Overall the false positives are quite low (visually, which is hand wavey, of course). I've not really seen a big event that was not real. I ran it for a while 24/7 and while there are "scintillations" there aren't any circular waves. False negatives are a much bigger issue. Something like an IRBM or SRBM doesn't really show up, and those are much more common.<p>Fwiw, this uses a bandpass filter to look for the ripples, which filters out a ton of noise. Looking at ionospheric depletion would be good and probably more sensitive, but it requires accurate models of what the ionosphere ought to do. I've tried a few things there with mixed results.</p>
]]></description><pubDate>Mon, 28 Nov 2022 00:11:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=33768342</link><dc:creator>tylerni7</dc:creator><comments>https://news.ycombinator.com/item?id=33768342</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33768342</guid></item><item><title><![CDATA[New comment by tylerni7 in "Rapid Fire security games"]]></title><description><![CDATA[
<p>:) Thanks for posting! I made this (the blog post/narrated the videos).<p>Some folks asked, so I also uploaded the source for the challenges in the videos: <a href="https://github.com/ForAllSecure/c2c-rapidfire-challenges" rel="nofollow">https://github.com/ForAllSecure/c2c-rapidfire-challenges</a></p>
]]></description><pubDate>Thu, 26 May 2016 18:03:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=11780147</link><dc:creator>tylerni7</dc:creator><comments>https://news.ycombinator.com/item?id=11780147</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11780147</guid></item><item><title><![CDATA[New comment by tylerni7 in "Remote Timing Attacks Are Practical"]]></title><description><![CDATA[
<p>Just so everyone knows, this specific attack is rather old. Modern versions of the RSA algorithm use blinding to specifically prevent this, which causes the RSA calculations to effectively be performed on random data.<p>There has also recently been a published timing attack regarding elliptic curve signatures, and there are some older papers about AES's vulnerability to timing attacks due to cache misses when using S-boxes. So while this paper specifically isn't a viable attack today, it is still relevant.</p>
]]></description><pubDate>Sun, 24 Jul 2011 19:15:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=2800100</link><dc:creator>tylerni7</dc:creator><comments>https://news.ycombinator.com/item?id=2800100</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=2800100</guid></item></channel></rss>