Security Conversations

221

Security Conversations

05.24.2026 | 44''17'

Jordan Wiens on AI, Offense vs. Defense, and the Dying CTF Pipeline

About the episode

(Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

Three Buddy Problem x Ekoparty Miami: Jordan Wiens, co-founder of Vector 35 and creator of Binary Ninja, talks about a decade spent building a decompiler in a market everyone told him not to enter. He walks through why accessibility drove the whole project, how Binja's intermediate-language system stacks up against IDA, Ghidra, and Radare, and why language-specific decompilation for Rust, C++, and Go is the next real frontier.

Plus, thoughts on AI disruption and why "the model can do it" misses the point that the model is just driving the tool, what verifiability really means, whether AI tilts the field toward offense or defense, and questions around subsidized tokens, the collapse of the CTF talent pipeline, and what happens to a craft when the shortcut is always one prompt away.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Jordan Wiens.

Timestamps:
0:00 Introductory banter
1:22 Vector 35 and the origin of Binary Ninja
2:32 From CTFs and SCIFs to building a decompiler
3:27 Before Ghidra: when an IDA license was out of reach
9:47 Language-specific decompilation: Rust, C++, and Go
12:47 Running a 17-person bootstrapped shop with no org chart
13:50 DARPA money, In-Q-Tel, and staying independent
15:23 AI as disruptor: the model drives the tool
18:06 Verifiability and the Fast16 reversing story
25:10 How AI actually gets used inside the company
28:52 Frontier models and guardrails
33:30 Will AI favor offense or defense?
40:51 Shrinking CTF talent pipelines

Links:

|

This site uses cookies and may process personal data based on our Privacy Policy