Hacker Newsnew | past | comments | ask | show | jobs | submit | michaelermer's commentslogin


This is crazy, friends told me apple was good on this, before we had to get a phone for our self, I now think they simply don't understand whats happening. It looks fine to non-tech parents i guess. The question is, what can be used as an alternative? I had first tried an old Android phone, but theres no way to disable app store, so kid figured out he can watch app store videos with no limit...


Android's not better, unfortunately. We also tried them for the kids, and most protection software back then simply could be killed by rebooting the phone and overloading the phone a bit immediately after reboot.


Same here, funadocs also integrates OpenAPI seamlessly and you can use blocks of the OpenAPI operations in your actual documentation which is perfect for writing developer guides.



This CVE is a joke, there is no attack vector. If an attacker is able to create an object with an executable function in the scope claimed in the CVE, he may just run the malicious code himself.


This is crazy, heres a video what happens after deleting and opening your URL. https://www.youtube.com/watch?v=DMY7Z9Fe0ic Before testing that I had the app itself removed months ago...


Or a credit card ;)


They don't tell if it was exploited, all they said was "we have no logs".


Yes, all of them


Also look at stuff like this... https://github.com/SeleniumHQ/selenium/pull/5468


The main question which is coming to my mind right now is how on earth did this guy get contributor access to the repository. And here I used to think that being maintainer of a large open source project must take a lot of talent and hard work.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: