For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
Compromising a Linux desktop using 6502 processor opcodes on the NES (2016)
(
scarybeastsecurity.blogspot.com
)
1 point
by
Bratmon
7 months ago
|
past
Reverse engineering a forgotten 1970s Intel dual core beast: 8271 (2020)
(
scarybeastsecurity.blogspot.com
)
115 points
by
signa11
on Feb 15, 2024
|
past
|
21 comments
Recovering "lost" treasure-filled floppy discs with an oscilloscope
(
scarybeastsecurity.blogspot.com
)
3 points
by
goranmoomin
on Nov 7, 2023
|
past
The cleverest floppy disc protection ever? Western Security Ltd. (2020)
(
scarybeastsecurity.blogspot.com
)
2 points
by
mtmail
on Aug 17, 2023
|
past
Recovering “lost” treasure-filled floppy discs with an oscilloscope
(
scarybeastsecurity.blogspot.com
)
1 point
by
nixass
on May 18, 2021
|
past
Recovering “lost” treasure-filled floppy discs with an oscilloscope
(
scarybeastsecurity.blogspot.com
)
306 points
by
scarybeast
on May 17, 2021
|
past
|
53 comments
Reverse engineering a forgotten 1970s Intel dual core beast: 8271, a new ISA
(
scarybeastsecurity.blogspot.com
)
3 points
by
diffuse_l
on Jan 12, 2021
|
past
|
1 comment
The cleverest floppy disc protection ever? Western Security Ltd
(
scarybeastsecurity.blogspot.com
)
339 points
by
scarybeast
on Dec 14, 2020
|
past
|
130 comments
Reverse engineering a forgotten 1970s Intel dual core beast: 8271, a new ISA
(
scarybeastsecurity.blogspot.com
)
169 points
by
scarybeast
on Nov 16, 2020
|
past
|
39 comments
Turning a £400 BBC Micro (1981) into a $40k disc writer (1987)
(
scarybeastsecurity.blogspot.com
)
34 points
by
scarybeast
on July 10, 2020
|
past
|
5 comments
Weak bits floppy disc protection: an alternate origins story on 8-bit
(
scarybeastsecurity.blogspot.com
)
65 points
by
scarybeast
on June 27, 2020
|
past
|
11 comments
A wild bug: 1970s Intel 8271 disc chip ate my data
(
scarybeastsecurity.blogspot.com
)
97 points
by
scarybeast
on June 23, 2020
|
past
|
19 comments
Sampled sound 1980s style: from SN76489 square waves to samples
(
scarybeastsecurity.blogspot.com
)
1 point
by
Luc
on June 5, 2020
|
past
Sampled sound 1980s style: from SN76489 square waves to samples
(
scarybeastsecurity.blogspot.com
)
2 points
by
scarybeast
on June 2, 2020
|
past
Generic cross-browser cross-domain theft (2009)
(
scarybeastsecurity.blogspot.com
)
1 point
by
networked
on May 21, 2020
|
past
Clocking a 6502 simulator to 15GHz
(
scarybeastsecurity.blogspot.com
)
176 points
by
scarybeast
on April 13, 2020
|
past
|
74 comments
Introducing Qualys Project Zero?
(
scarybeastsecurity.blogspot.com
)
1 point
by
dsr12
on June 20, 2017
|
past
Yahoobleed: access other users' private Yahoo! Mail image attachments
(
scarybeastsecurity.blogspot.com
)
11 points
by
dsr12
on May 20, 2017
|
past
|
1 comment
Dumping Yahoo authentication secrets with an out-of-bounds read
(
scarybeastsecurity.blogspot.com
)
91 points
by
scarybeast
on May 19, 2017
|
past
|
7 comments
*bleed continues: 18 byte file, $14k bounty: leaking private Yahoo Mail images
(
scarybeastsecurity.blogspot.com
)
4 points
by
scarybeast
on May 19, 2017
|
past
Further hardening glibc malloc() against single byte overflows
(
scarybeastsecurity.blogspot.com
)
131 points
by
scarybeast
on May 17, 2017
|
past
|
35 comments
Are we doing memory corruption mitigations wrong?
(
scarybeastsecurity.blogspot.com
)
3 points
by
mpweiher
on May 17, 2017
|
past
Are we doing memory corruption mitigations wrong?
(
scarybeastsecurity.blogspot.com
)
1 point
by
ingve
on May 16, 2017
|
past
Proving Box.com fixed ASLR via ImageMagick uninitialized zlib stream buffer
(
scarybeastsecurity.blogspot.com
)
2 points
by
scarybeast
on May 11, 2017
|
past
Proving missing ASLR on dropbox.com and box.com over the web for a $343 bounty
(
scarybeastsecurity.blogspot.com
)
6 points
by
scarybeast
on May 11, 2017
|
past
Ode to the use-after-free: one vulnerable function, a thousand possibilities
(
scarybeastsecurity.blogspot.com
)
65 points
by
ingve
on May 8, 2017
|
past
|
25 comments
Ode to the use-after-free: one vulnerable function, a thousand possibilities
(
scarybeastsecurity.blogspot.com
)
2 points
by
el_duderino
on May 6, 2017
|
past
Ode to the use-after-free: one vulnerable function, a thousand possibilities
(
scarybeastsecurity.blogspot.com
)
2 points
by
scarybeast
on May 6, 2017
|
past
Black box discovery of memory corruption RCE on box.com
(
scarybeastsecurity.blogspot.com
)
2 points
by
jgrahamc
on March 30, 2017
|
past
Black box discovery of memory corruption RCE on box.com
(
scarybeastsecurity.blogspot.com
)
2 points
by
scarybeast
on March 30, 2017
|
past
More
Consider applying for YC's Summer 2026 batch! Applications are open till May 4
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.