nevin shine
systems security researcher // grad 2028
kernel panic enthusiast
+ system identity loaded
focusing on unified runtime and network defense. targeting cross-layer intent enforcement & zero-trust architecture to close the semantic-to-execution gap.
sentinel-stack — monorepo
the core deterministic 5-pillar security architecture. orchestrates the zero-trust environment from ring -1 to ring 3 using submodules.
read specssentinel-runtime — ring 0
active (m8.2). pure ebpf-lsm engine featuring recursive process bloodline tracking and atomic inheritance for real-time protection.
read specshyperion-xdp — wire
active (m5.0). network border patrol achieving ~65 gbps throughput with zero-copy telemetry and ebpf-powered packet filtering.
read specssentinel-cc — compile
llvm-based policy-carrying code featuring phase 2 deep cfi and aslr-aware enforcement for compile-time security guarantees.
read specstelos-lang — compile
kernel-aware intent compiler utilizing z3 smt solvers and dual-target ir for mathematically proving zero-trust state constraints.
read specssentinel-kv — analysis
llvm ir and smt formal verification toolchain targeting stack-spill pointer tracking and inline assembly policy enforcement.
read specssentinel-vmi — ring -1
testing. amd-v npt guard & aarch64 el2 drawbridge bare-metal hypervisor.
read specsnew project: tbd — later 2026
adaptive kernel-level defense systems for space cybersecurity. research initiative for satellite communication security.
l languages
c, c++, rust, go, python, aarch64/x86 assembly
k low-level
ebpf, xdp, lsm, llvm pass dev, kernel hooking
h hardware
armv8 el2, stage 2 mmu, amd-v npt guard
m formal
z3 smt, hoare logic, ifc lattice
f forensics
qemu bare-metal, gdb, bpftool, strace, pahole
~ afk status
tinkering with homelabs, deep sci-fi lore, and making terrible coffee
♪ frequencies
bouncing between jeremias, brutalismus 3000, and pnb rock
* hardware
building custom split keyboards with way too many layers