Security Weekly Podcast Network (Audio)

Airsnitch, Claude, Hacking Firewalls - PSW #916

Mar 5, 2026
A deep dive into AirSnitch attacks that bypass Wi‑Fi client isolation and how SSID/VLAN tricks make it possible. Discussion of vulnerable consumer networking gear, Linux on edge devices, and long‑running Cisco SD‑WAN exploits. Coverage of using AI to accelerate hardware/driver research and a Claude‑assisted BLE tracker detector. Privacy risks from TPMS tracking and insecure solar inverter firmware are highlighted.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Hidden Linux Layers Create Visibility Gaps

  • Many network edge vendors lock down the underlying Linux, limiting customer and third‑party visibility while attackers who exploit RCE gain full low‑level access.
  • That gap leaves incident responders and security vendors blind to attacker activity inside the appliance OS.
ADVICE

Negotiate Vetted Access For Appliance Visibility

  • Push vendors to create partner programs that grant vetted security vendors controlled access to appliance internals for monitoring and forensics.
  • Use sandboxed debug features cautiously and demand secure APIs rather than ad hoc command runners.
ANECDOTE

Claude Built A BLE Privacy Detector In Hours

  • Larry used Claude to spec and build a privacy detector on a cheap yellow display that detects BLE trackers and vendor identifiers.
  • The project took about three hours and includes receive/transmit modes and a confusion mode to spam identifiers for testing.
Get the Snipd Podcast app to discover more snips from this episode
Get the app