Security Weekly Podcast Network (Audio) Airsnitch, Claude, Hacking Firewalls - PSW #916
Mar 5, 2026
A deep dive into AirSnitch attacks that bypass Wi‑Fi client isolation and how SSID/VLAN tricks make it possible. Discussion of vulnerable consumer networking gear, Linux on edge devices, and long‑running Cisco SD‑WAN exploits. Coverage of using AI to accelerate hardware/driver research and a Claude‑assisted BLE tracker detector. Privacy risks from TPMS tracking and insecure solar inverter firmware are highlighted.
AI Snips
Chapters
Transcript
Episode notes
Hidden Linux Layers Create Visibility Gaps
- Many network edge vendors lock down the underlying Linux, limiting customer and third‑party visibility while attackers who exploit RCE gain full low‑level access.
- That gap leaves incident responders and security vendors blind to attacker activity inside the appliance OS.
Negotiate Vetted Access For Appliance Visibility
- Push vendors to create partner programs that grant vetted security vendors controlled access to appliance internals for monitoring and forensics.
- Use sandboxed debug features cautiously and demand secure APIs rather than ad hoc command runners.
Claude Built A BLE Privacy Detector In Hours
- Larry used Claude to spec and build a privacy detector on a cheap yellow display that detects BLE trackers and vendor identifiers.
- The project took about three hours and includes receive/transmit modes and a confusion mode to spam identifiers for testing.
