Omslagafbeelding van de show Hacker Anthology

Hacker Anthology

Podcast door Hacker Anthology

Engels

Technologie en Wetenschap

Tijdelijke aanbieding

2 maanden voor € 1

Daarna € 9,99 / maandElk moment opzegbaar.

  • 20 uur luisterboeken / maand
  • Podcasts die je alleen op Podimo hoort
  • Gratis podcasts
Begin hier

Over Hacker Anthology

Hacker Anthology is what happens when you inject fiction into the command line of reality. Faction stories — part fact, part fiction — spun from real-world headlines, startup chaos, cyber leaks, and tech drama. Imagine HackerNews got drunk with Black Mirror, and they started roleplaying historical fiction. That’s us. We take raw internet lore — a GitHub repo flame war, a VC meltdown, an obscure RFC gone rogue — and remix it into cinematic short stories told from the POV of AI misfits, terminal cowboys, and burnout founders one commit from collapse. If you ever wished blog posts had plot twists, you’re in the right shell.

Alle afleveringen

62 afleveringen

aflevering Proof of Play artwork

Proof of Play

2027’s premier esports season implodes when “ghost” cheaters slide under every defense—hypervisor cloaks, DMA FPGAs masquerading as USB, SSD firmware that outlives wipes—while pristine TPM proofs lull servers into trust. After an aggressive allowlist update bricks fan utilities and ignites the rootkit debate, a top contender reads clean yet moves like a machine. Sponsors waver, an anti-rootkit bill sharpens its teeth, and the highlight reels won’t stop. Enter Adrian “s4dbrd,” a meticulous Windows internals researcher whose blog posts taught both sides of the arms race. He’s drafted to fix the mess he helped shape—on one condition: whatever ships must protect fair play without turning PCs into surveillance boxes. Adrian forges an uneasy coalition from warring camps—Riot’s boot-start hardliners, Epic’s Secure Boot/TPM pragmatists, FACEIT’s telemetry monks, plus independent reversers and hardware realists. Their moonshot, Project Sentinel, fuses attestation with behavior: per‑match TPM attestations of a known‑good driver set, raw HID input stamped at microsecond resolution, server‑side transformers trained to recognize human motor signatures, and Ulf Friske’s left‑field gambit—fingerprinting PCIe impostors by their power and thermal noise under load. Meanwhile, cheat syndicates pivot to BYOVD payloads wrapped in RGB tools and mint “clean” proofs through compromised signing chains. In a story told through commit diffs, Slack fragments, redacted MSRC notes, and sideline broadcast chatter, CI pipelines become chase scenes and a design doc becomes a smoking gun. With a $10M championship in days and a hostile Hill hearing queued up, Adrian uncovers a subtle PCR manipulation that props up the laundered attestations. Now the clock is brutal: quarantine drifted measurements without bricking half the scene, backstop calls with explainable telemetry, and quietly migrate stage PCs to a semi‑cloud, read‑only image—without burning an innocent star on air or detonating a new privacy firestorm. Rooted in real primitives and real politics, this techno‑thriller asks whether trust can be engineered—and explained—in time: can a fractured coalition catch ghosts beneath the kernel and restore legitimacy without becoming the very rootkit their critics fear? Inspired by: How kernel anti-cheats work - https://s4dbrd.github.io/posts/how-kernel-anti-cheats-work/ * (00:00) - Fire Drill in Ring 0 * (07:20) - Noise on the Bus * (14:23) - The Drift Window * (22:41) - Cold Stage, Warm Hands * (29:54) - Credits

19 mrt 2026 - 30 min
aflevering Routing the Sky artwork

Routing the Sky

In 2025, SpaceX stops renting spectrum and buys it—flipping AWS‑4/H‑block into a 2 GHz MSS backbone and lighting a 15,000‑satellite LEO/VLEO swarm with optical links that behave like dark fiber in orbit. Ordinary phones see the sky as Band 23; terrestrial small cells mirror the band on the ground. The pitch is ruthless and elegant: route around borders, wholesale to carriers, and make failover a firmware default. Gwynne Shortwell, SpaceX’s unflappable dealmaker, becomes both architect and lightning rod—threading FCC rulemakings, ITU timelines, and 3GPP edge cases while coaxing chip vendors to bless the bands. Mentor‑antagonist Jessica Rosenworth wants safety first and legible policy; spectrum grandmaster Charlie Ergon plays ally and trap‑setter; T‑Mobile toggles between partner and rival. The central question lands with orbital precision: can Shortwell keep a sovereign‑agnostic network truly neutral once everyone needs it? The first crucible hits like a landfall: a catastrophic hurricane snaps towers; phones silently roam to MSS; lives are saved—then a rare handover edge case bricks a beloved handset on the way back to terrestrial. Lawsuits stack. CTIA and European telcos demand power caps and carve‑outs. A rushed modem fix exposes a Band‑23 power‑control quirk, quietly weaponized by a foreign service to herd protesters into satellite mode for mass geolocation. Trade journalist Rachel Jouett turns filings and firmware into front‑page stakes, even as a whistleblower hints at a compromised supplier and a rogue payload buried in the flock. Standards meetings feel like courtrooms, and BGP‑like pathing on the laser mesh becomes a new venue for policy: which packets get priority when every beam is a lane? As the constellation scales, orbital traffic rules harden, insurers invent “satellite life policies,” and a geomagnetic storm drags hundreds of VLEO craft into luminous, unsettling reentries. The Space Development Agency leans on priority lanes; forty nations serve simultaneous subpoenas for the shadow internet’s routes. Rosenworth pushes for fail‑safe failover and public‑safety guarantees. Investors salivate; rivals circle; environmental researchers warn about alumina in the upper atmosphere. In a world where firmware defaults are ethics and routing tables read like treaties, Shortwell faces the choice that will define the sky: hold the mesh neutral and global—or fracture it along the borders it was built to ignore. Inspired by: SpaceX Seeks Approval for 15,000 Satellites to Use MSS Spectrum - https://www.satellitetoday.com/connectivity/2025/09/25/spacex-seeks-approval-for-15000-satellites-to-use-mss-spectrum/ * (00:00) - The Spectrum Gambit * (05:55) - Trial by Hurricane * (10:43) - The Herding Exploit * (12:42) - Noctilucent Routing * (15:52) - The Dark Fiber Accord * (21:30) - Credits

28 sep 2025 - 21 min
aflevering Black Box Winter artwork

Black Box Winter

Vienna, present day. Anonymous Komplandt applies for an electricity contract and is shut out in the time it takes a cursor to blink. No reason. No human. Just a black‑box score from KSV1870—data points she never agreed to, stitched into a verdict she can’t contest. She walks into noyb’s offices with a notebook full of timestamps and meter photos; Martin Baumler, a quietly relentless litigator with Article 22 engraved in muscle memory, sees a test case. With the CJEU’s SCHUFA ruling as his lodestar, he aims to pry open the algorithm that turned a clerical rumor into a life decision. As the Austrian Data Protection Authority issues a targeted processing ban and demands intelligible explanations, a national fight erupts. Inside KSV1870, compliance and data science collide over a scoring engine whose power is its opacity; at energy provider Unsere Wasserkraft, spreadsheets and PR statements can’t answer a basic question: who actually flipped the switch? Investors, ministers, and rival agencies circle while a whistleblower drops a map of a gray market for “clean profiles,” where mislinked identities and stale debts propagate like supply‑chain bugs. noyb counters with a radical tool—the Score Bill of Materials—an SBOM-style trace of every data source, inference, and vendor hop, turning privacy law into a forensic chase. Nighttime hearings, code‑and‑compliance audits, boardroom brinkmanship, and the human cost of a “design choice” gather into a pressure cooker. Winter creeps closer. If industry appeals succeed, the black‑box regime returns; if transparency and meaningful human review hold, Europe’s credit and utility markets must reboot overnight. In a climactic public hearing where SCHUFA’s precedent looms, Baumler has to translate doctrine into operational constraints—consent and explainability as civil‑rights infrastructure—or accept that automation gets to decide who keeps the lights on. Black Box Winter asks a stark question in the glow of a phone screen: can one woman’s denial unravel an entire data supply chain before the cold sets in? Inspired by: Noyb WIN: Austrian authority forbids unlawful credit scoring by KSV1870 - https://noyb.eu/en/noyb-win-austrian-authority-forbids-unlawful-credit-scoring-ksv1870 * (00:00) - Milliseconds to No * (03:12) - The Map Arrives * (07:52) - Rubber-Stamp Humans * (11:33) - Hearing: Build or Blackout * (16:32) - Credits

27 sep 2025 - 16 min
aflevering Signal Lost: The Zero Day Reckoning artwork

Signal Lost: The Zero Day Reckoning

In a near-future America, the sprawling rail network—kept alive by decades-old control systems—becomes ground zero for a chilling new wave of cyberattacks. Neil Smythe, a battle-scarred whistleblower haunted by past failures, and his irrepressible partner Eric Reuther, a social engineer with hacker roots, have long warned of a catastrophic flaw in the nation’s train braking systems. Their alarms fell on deaf ears, drowned out by the powerful American Rail Consortium (ARC), whose lobbyists mask self-preservation as prudence. But when simultaneous, inexplicable brake failures derail both a Los Angeles commuter train and a Midwest chemical freight, panic shreds the illusion of safety. As union crews strike, copycat hackers exploit the chaos, and the government teeters on the brink of suspending rail traffic, Smythe and Reuther are thrust from obscurity into the heart of a crisis they alone predicted. With public trust eroding and conspiracy theories swirling, the duo joins forces with Chris Butero, a pragmatic CISA official torn between bureaucracy and duty. Together, they must navigate a labyrinth of media manipulation, industry denial, and their own haunted pasts to expose the true mastermind behind the attacks. But every step forward threatens to unleash further chaos, as a rogue hacktivist group blurs the line between whistleblowing and sabotage. Racing against institutional inertia and the ticking clock of national collapse, Smythe and Reuther must prove that conviction and expertise can still drive real change—before the ghosts of complacency doom America’s industrial backbone forever. Inspired by: Hackers Can Tamper with Train Brakes Using Just a Radio, Feds Warn - https://gizmodo.com/hackers-can-tamper-with-train-breaks-using-just-a-radio-feds-warn-2000629522 * (00:00) - Signals Crossed * (04:18) - Protocol Zero * (08:23) - Breach Demonstration * (12:47) - Reassembly * (17:07) - Credits

17 jul 2025 - 17 min
aflevering Through Walls: The Signal Revolution artwork

Through Walls: The Signal Revolution

In a near-future Boston pulsing with smart sensors and hidden eyes, a team at MIT’s Media Lab unveils mmNorm—a wireless imaging breakthrough that can peer through walls, revolutionizing healthcare, logistics, and robotics. But as the world races to harness its power, the technology’s shadow side emerges: governments and corporations weaponize it for surveillance, political crackdowns, and social control. At the center of the storm is Fadel Adib, the visionary but haunted lab director, whose ambition to democratize technology collides with his growing dread of its misuse. Laura Dodds, the fiercely principled lead developer, becomes the conscience of the team, risking everything to expose abuses and rally resistance, while Tara Boroushaki, torn between loyalty, ambition, and ethics, faces a career-defining choice as defense contractors circle with blank checks. Former postdoc Kaichen Zhou, now a pawn in global espionage, must decide where his true allegiances lie as the stakes escalate from lab politics to international intrigue. As mmNorm’s invisible gaze begins to threaten the very freedoms it was meant to protect, the Media Lab transforms into a battleground—intellectual property disputes, hacker undergrounds, and diaspora anxieties colliding in a high-stakes fight for control. The team is forced to confront the double-edged sword of innovation: can they reclaim agency over their creation before it’s too late, or will the future they unleashed consume them and the world they hoped to save? Trust, betrayal, and the limits of technological progress are tested in a pulse-pounding race against time, where every decision could tip the balance between liberation and oppression. Inspired by: Imaging technique reconstructs the shapes of hidden objects - https://news.mit.edu/2025/new-imaging-technique-reconstructs-hidden-object-shapes-0701 * (00:00) - A Glimpse Through Walls * (03:55) - Fractures in the Code * (06:54) - The Offer and the Outcast * (12:57) - The Siege of the Lab * (18:42) - Invisible Again * (23:39) - Credits

2 jul 2025 - 23 min
Super app. Onthoud waar je bent gebleven en wat je interesses zijn. Heel veel keuze!
Super app. Onthoud waar je bent gebleven en wat je interesses zijn. Heel veel keuze!
Makkelijk in gebruik!
App ziet er mooi uit, navigatie is even wennen maar overzichtelijk.

Kies je abonnement

Meest populair

Tijdelijke aanbieding

Premium

20 uur aan luisterboeken

  • Podcasts die je alleen op Podimo hoort

  • Geen advertenties in Podimo shows

  • Elk moment opzegbaar

2 maanden voor € 1
Daarna € 9,99 / maand

Begin hier

Premium Plus

Onbeperkt luisterboeken

  • Podcasts die je alleen op Podimo hoort

  • Geen advertenties in Podimo shows

  • Elk moment opzegbaar

Probeer 7 dagen gratis
Daarna € 13,99 / maand

Probeer gratis

Alleen bij Podimo

Populaire luisterboeken

Begin hier

2 maanden voor € 1. Daarna € 9,99 / maand. Elk moment opzegbaar.