Event JSON
{
"id": "a7a55379ea7aceaf11de89223b268e927445e850c1e8dea26b07a3cc6ad204aa",
"pubkey": "f5759699c92ae2addf1eac17701485903a7344f16e19fd77a2e374e4043969bd",
"created_at": 1725829480,
"kind": 1,
"tags": [
[
"zap",
"f5759699c92ae2addf1eac17701485903a7344f16e19fd77a2e374e4043969bd",
"wss://relay.mostr.pub",
"0.915"
],
[
"zap",
"6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9",
"wss://relay.mostr.pub",
"0.085"
],
[
"t",
"Akaso"
],
[
"t",
"ek7000"
],
[
"proxy",
"https://fosstodon.org/users/governa/statuses/113103960840121642",
"activitypub"
]
],
"content": "Reverse Engineering The Web API Of An #Akaso #EK7000 Action Camera \n\nhttps://hackaday.com/2024/09/08/reverse-engineering-the-web-api-of-an-akaso-ek7000-action-camera/",
"sig": "8c7b8c633af863b2642a3d5855b6bda91beb839e3769c3f9706c2e1f6274db05657de0137cb99f6742a489738bb263c530cbfa21ba4ede4cb971e9bd3350dc3b"
}