<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: willamhou</title><link>https://news.ycombinator.com/user?id=willamhou</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 06:19:35 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=willamhou" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by willamhou in "I ported Mac OS X to the Nintendo Wii"]]></title><description><![CDATA[
<p>Had a very similar issue porting a hypervisor to ARM S-EL2. Writes would succeed, there were no faults, and everything looked reasonable in GDB, but the other side never saw the data. The root cause was that Secure and Non-Secure physical address spaces were backed by different memory even at the same address, and a single PTE bit selected between them. That took me much longer to understand than I’d like to admit.</p>
]]></description><pubDate>Thu, 09 Apr 2026 01:46:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47698415</link><dc:creator>willamhou</dc:creator><comments>https://news.ycombinator.com/item?id=47698415</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47698415</guid></item><item><title><![CDATA[New comment by willamhou in "Project Glasswing: Securing critical software for the AI era"]]></title><description><![CDATA[
<p>One thing I keep thinking about with AI security is that most of 
the focus is on model behavior — alignment, jailbreaks, guardrails. 
But once agents start calling tools, the attack surface shifts to 
the execution boundary. A request can be replayed, tampered with, 
or sent to the wrong target, and the server often has no way to 
distinguish that from a legitimate call.<p>Cryptographic attestation at the tool-call level (sign the request, 
verify before execution) would close a gap that behavioral controls 
alone can't cover. Curious whether Glasswing's threat model 
includes the agent-to-tool boundary or focuses primarily on the 
model layer.</p>
]]></description><pubDate>Wed, 08 Apr 2026 10:04:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47687968</link><dc:creator>willamhou</dc:creator><comments>https://news.ycombinator.com/item?id=47687968</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47687968</guid></item></channel></rss>