ABOUT
whoami
Rich Smith. Security researcher, R&D leader, occasional co-founder. Two decades spent breaking things and building the teams that break things — from HP Labs and Immunity through Morgan Stanley, Etsy, Duo Security, Gemini, Crash Override, and now Mindgard.
Interests: offensive security, firmware, AI security, vulnerability research, building security programs that don’t slow engineering down.
sin-ack
Named for the TCP three-way handshake — SYN, SYN-ACK, ACK — the protocol that opens every connection. A fitting name for a site about making and breaking connections.
About this site
Built with a custom Python pipeline. No frameworks. The aesthetic draws from monochrome LCD displays, Psion handhelds, and the fictional terminals of Gibson’s Sprawl trilogy. Images are Atkinson-dithered at build time. The interface is fully keyboard-navigable.
Stack: Python, Jinja2, vanilla JS, a bit of WebGL for the LCD effect, and some build-time minification to keep things tight.
Press ~ to open the console. Poke around — there are things hidden in here.