This writeup is great, particularly the discussion of how Mehmet worked through understanding the system.
That said, Logpoint sell a siem product w/o a vulnerability intake process and that can't manage to rapidly patch pre-auth RCE security holes. There's nothing to say besides Logpoint are not serious people and nobody should use their nonsense. Given the number of bugs found and the surface level depth, security wasn't even an afterthought; it was not thought about at all.
When you let google read your site, let alone sign deals with them, you create commercial incentives to rank/post on reddit. Everything that follows is inevitable and obvious.
They have now positioned themselves as an ai-slop source of truth. Expect everyone interested in ranking well in google's AI Overview -- essentially every marketer -- to treat reddit as a high-priority slop/advertising target.
It reminds me of python 3. Basically, a huge chunk of people (in my case, scientific programming) get an enormous mess and nothing at all of value until... 3.6 maybe (the infix matrix mult operator). Stunningly, people weren't enthused about this deal.
We tried these AI-produced ads. They produced gibberish. Random mutations of our existing ads with nonsensical words and the desired actions just permutated.
I occasionally buy travel data, and 3 of probably 8-ish instances had me on the phone with support for at least 20 minutes (and once an hour) to make an esim work. Perhaps the problem is android. But I've never had that experience with a physical sim. :shrug:
Did this yesterday on Android when arriving into Indonesia. While my wife waited in immigration, I used the Smart Gates. I downloaded an eSim via Airalo in just 90 seconds, providing me with enough data to send her a "good luck" message and let her know I'd see her at the hotel if she cleared immigration.
Turns out women can be independent and don't need 24/7 supervision. If you fly often, there are situations where it's easier to stick together and situation where it's better to go independently. Especially if one of you can take the kids the faster way.
Traveling with kids is a different story, but there’s no mention of that here. Most people wouldn’t jettison a regular friend at passport control, text them “good luck” and head off to the hotel. This guy did it to his wife.
Well, if its related to the original poster, then how do you know it is their first time in indonesia? :)) Most likely, :)), it is Bali, and for sure, you can leave wifey alone.
Fair enough. Still rather odd thing to write without at least acknowledgment of this being unusual — I guess this is what had people somewhat triggered, because they made it sound as if this was a natural thing to. But we digress.
To clarify, I went to the hotel, she got through (eventually) and went to a conference. I collected her luggage. We met back at the hotel later that evening.
My experience is watching a colleague use lovable which will mostly ignore security. Sure, if you prompt it the system will do something which seems correct, but it will also happily undo that as well.
eg I was trying to help her set up a webhook listener, and it undid our efforts.
These tools seem incapable of building software in the hands of users who don't understand security already.
> These tools seem incapable of building software in the hands of users who don't understand security already.
These tools are for augmentation of skills, not for wholesale "imma a programmer now", which a lot of people seem to think. And to be honest, lots of companies are selling that "experience" too, even though they know it isn't true, a bit shit.
It's definitely pushed as not needing an engineer.
My colleague now understands why unit tests, after watching subsequent development regularly break previous work. Lovable doesn't support them. And I don't want to touch this codebase because I don't want to own it.
That said, Logpoint sell a siem product w/o a vulnerability intake process and that can't manage to rapidly patch pre-auth RCE security holes. There's nothing to say besides Logpoint are not serious people and nobody should use their nonsense. Given the number of bugs found and the surface level depth, security wasn't even an afterthought; it was not thought about at all.
reply