Reverse engineer, student
Currently contracting for Beeper
| Blog | https://jjtech.dev |
| GitHub | https://github.com/JJTech0130 |
| [email protected] |
Reverse engineer, student
Currently contracting for Beeper
| Blog | https://jjtech.dev |
| GitHub | https://github.com/JJTech0130 |
| [email protected] |
Turns out it's not actually that hard, I implemented a simple synthetic HID device for macOS:
https://gist.github.com/JJTech0130/fae6b6ee6ae4232172a9188fb199d5d9
Does anyone have any experience using AppleUSBUserHCIPort/com.apple.usb.hostcontrollerinterface?
Apparently that seems to be what Virtualization.framework and VirtualHere use under-the-hood to create fake USB devices on macOS.
EDIT: Apparently it's documented API under IOUSBHostControllerInterface.h in IOUSBHost.framework

Binary obfuscation in 2026:
Just put ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FA... into your program 😎
Thanks to @mxey for the idea
I'm excited to release Just the Browser! It helps you remove AI features, sponsored content, shopping integrations, and other annoyances from desktop web browsers.
This project includes configuration files (group policies), a simple setup script, and guides for manual installation. It supports Chrome, Firefox, and Edge. Everything is open-source on GitHub.