nevin shine
systems security researcher // grad 2028
kernel panic enthusiast
+ system identity loaded
focusing on unified runtime and network defense. targeting cross-layer intent enforcement & zero-trust architecture to close the semantic-to-execution gap.
sentinel-runtime — ring 0
active (m8.2). pure ebpf-lsm engine featuring recursive process bloodline tracking and atomic inheritance for real-time protection.
read specshyperion-xdp — wire
active (m5.0). network border patrol achieving ~65 gbps throughput with zero-copy telemetry and ebpf-powered packet filtering.
read specssentinel-cc — compile
llvm-based policy-carrying code featuring phase 2 deep cfi and aslr-aware enforcement for compile-time security guarantees.
read specsnew project: tbd — later 2026
adaptive kernel-level defense systems for space cybersecurity. research initiative for satellite communication security.
l languages
c, c++, rust, go, python, sql, java, bash
k low-level
ebpf, xdp, lsm, llvm pass dev, x86_64 asm, kernel hooking
r research
cfi, aslr evasion defense, prompt injection mitigation
f forensics
gdb, bpftool, strace, pahole, objdump, docker
~ afk status
tinkering with homelabs, deep sci-fi lore, and making terrible coffee
♪ frequencies
bouncing between jeremias, brutalismus 3000, and pnb rock
* hardware
building custom split keyboards with way too many layers