I see a very small minority of people using Kbin, but I don’t understand why.

Is this just a coincidence and did some people choose Kbin over Lemmy or is there a good reason to use Kbin?

  • Swedneck@discuss.tchncs.de
    link
    fedilink
    arrow-up
    1
    arrow-down
    2
    ·
    1 year ago

    but the fundamental vulnerability is not in the UI, by that logic you could just run your own UI and get into servers without issue, the vulnerability is always in either the server software or in the specific deployment.

      • Swedneck@discuss.tchncs.de
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        1 year ago

        again, that makes no sense whatsoever, by that logic anyone can just merrily wreak havoc by using a client specially made to have vulnerabilities.

        • snowe@programming.dev
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          It was a csrf issue. The vulnerability isn’t on the attackers side, it’s on the user’s side. I’m telling you this as the owner of the instance. I’m sorry, but you are wrong here.