Event JSON
{
"id": "f019d26719b6a6ce7d53eac2a0b3064f49717c55723e659b9fde7e1a819fb29c",
"pubkey": "b8c81c33d778b517a18b09d039bcd461f64a7a93228b7c63c912dd6bbaf44ed4",
"created_at": 1711832030,
"kind": 1,
"tags": [
[
"p",
"ebf2233367c2e017e1f2e127464327ef27752a006fb8cc9b7f38354fddab893e",
"wss://relay.mostr.pub"
],
[
"p",
"41da972ce9845df269129ba40d397d21d2e11acfbf49843d38aa66532205b748",
"wss://relay.mostr.pub"
],
[
"e",
"0d750ba19761ea1999ab35346fd90376cbac1faf18ecdb5bbc61edf2785fd32c",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://toot.aquilenet.fr/users/yunohost/statuses/112186623960919860",
"activitypub"
]
],
"content": "nostr:npub1a0ezxvm8ctsp0c0juyn5vse8aunh22sqd7uvexml8q65lhdt3ylqyrrtg2 oui c’est bon ! Debian bullseye n’est pas concerné par cette backdoor donc YunoHost non plus",
"sig": "29c90a25e32eb4540e012f21c86e9aa8a8049598a4128abb77c3ac338cccbc8c565cfa7daf10df669b598ff1432a7fdbe7d0a7b79c38a0a3d62d82a59e805d8c"
}