I see a very small minority of people using Kbin, but I don’t understand why.
Is this just a coincidence and did some people choose Kbin over Lemmy or is there a good reason to use Kbin?
I see a very small minority of people using Kbin, but I don’t understand why.
Is this just a coincidence and did some people choose Kbin over Lemmy or is there a good reason to use Kbin?
but the fundamental vulnerability is not in the UI, by that logic you could just run your own UI and get into servers without issue, the vulnerability is always in either the server software or in the specific deployment.
The vulnerability was in the ui.
again, that makes no sense whatsoever, by that logic anyone can just merrily wreak havoc by using a client specially made to have vulnerabilities.
It was a csrf issue. The vulnerability isn’t on the attackers side, it’s on the user’s side. I’m telling you this as the owner of the instance. I’m sorry, but you are wrong here.