Remix.run Logo
konaraddi 3 hours ago

I think a significant distinction between your approach and Claude’s approach is that your approach requires allowing your machine to accept inbound connections but Claude’s approach does not. Claude probably went with the latter to avoid a whole class of security issues and mitigate risk of users having their machines compromised. I’m not familiar with what the new vectors of attack are with Claude’s approach though.