this post was submitted on 28 Oct 2025
28 points (96.7% liked)

Cybersecurity

8549 readers
346 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
top 7 comments
sorted by: hot top controversial new old
[–] the_q@lemmy.zip 16 points 2 days ago (2 children)

You have to be a special kind of stupid to use this browser.

[–] neon_nova@lemmy.dbzer0.com 2 points 2 days ago

I have it a try out of curiosity. It was interesting to see it run, but it do the task slower than I could do it, so I’m not really sure of the use case for it.

[–] PacMan@sh.itjust.works 2 points 1 day ago

No, I’m a CEO

[–] SSUPII@sopuli.xyz 11 points 2 days ago (2 children)

Was the browser vibe coded?

[–] EnsignWashout@startrek.website 11 points 2 days ago

It feels like everything is vibe coded, now.

I need to start a vintage software hobby.

[–] borth@sh.itjust.works 3 points 2 days ago

I mean, the article states the browser checks the URL the users paste, and if it's not a URL, then it must be a prompt. So.... Probably.

[–] deafboy@lemmy.world 1 points 13 hours ago* (last edited 13 hours ago)

A user copies it without scrutiny, pastes it into the omnibox

User has to type or paste the malicious prompt manually into the box. This is not a bug.

The whole article is a marketing piece to promote NeuralTrust.