logoalt Hacker News

konaraddiyesterday at 1:50 PM0 repliesview on HN

I think a significant distinction between your approach and Claude’s approach is that your approach requires allowing your machine to accept inbound connections but Claude’s approach does not. Claude probably went with the latter to avoid a whole class of security issues and mitigate risk of users having their machines compromised. I’m not familiar with what the new vectors of attack are with Claude’s approach though.