nevin shine

systems security researcher // grad 2028

kernel panic enthusiast

t g l @

+ system identity loaded

focusing on unified runtime and network defense. targeting cross-layer intent enforcement & zero-trust architecture to close the semantic-to-execution gap.

+ sentinel stack

sentinel-runtime — ring 0

active (m8.2). pure ebpf-lsm engine featuring recursive process bloodline tracking and atomic inheritance for real-time protection.

read specs

hyperion-xdp — wire

active (m5.0). network border patrol achieving ~65 gbps throughput with zero-copy telemetry and ebpf-powered packet filtering.

read specs

sentinel-cc — compile

llvm-based policy-carrying code featuring phase 2 deep cfi and aslr-aware enforcement for compile-time security guarantees.

read specs

telos-runtime — ring 0

loading (80%). lsm · intent correlation.

read specs

sentinel-vmi — ring -1

testing (50%). amd-v · npt guard introspection.

read specs

new project: tbd — later 2026

adaptive kernel-level defense systems for space cybersecurity. research initiative for satellite communication security.

+ arsenal

l languages

c, c++, rust, go, python, sql, java, bash

k low-level

ebpf, xdp, lsm, llvm pass dev, x86_64 asm, kernel hooking

r research

cfi, aslr evasion defense, prompt injection mitigation

f forensics

gdb, bpftool, strace, pahole, objdump, docker

+ /dev/random

~ afk status

tinkering with homelabs, deep sci-fi lore, and making terrible coffee

frequencies

bouncing between jeremias, brutalismus 3000, and pnb rock

* hardware

building custom split keyboards with way too many layers