Event JSON
{
"id": "778a17682890b6a2c129a1c7dd4697240c052213b1835ccae9044b669065ffec",
"pubkey": "f9c4dead438177be7101eb7b5107db4e8bdf351840ddfc72f9f890dc8949309b",
"created_at": 1704017961,
"kind": 1,
"tags": [
[
"p",
"f82d7b00f32037e3eb3a7f44ca0c5d40ba785eaf676006e211c14a400df1232c",
"wss://relay.mostr.pub"
],
[
"p",
"7ed2c76c3a0afab2bce6b8c29291161a3871d16f6f96ee4565f9a2f592ce6194",
"wss://relay.mostr.pub"
],
[
"e",
"380337bcdb1c6016df424ba01118e21685541f08502d9ef26a6e651f5631ae18",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://fosstodon.org/users/JustineSmithies/statuses/111674521155549849",
"activitypub"
]
],
"content": "nostr:npub1lqkhkq8nyqm786e60azv5rzagza8sh40vasqdcs3c99yqr03yvkqep43xq I wonder if it's possible instead of using a random key for the cryptswap to read the same keyfile that is used to unlock the ZFS encryption so suspend to disk would work ?",
"sig": "751939d214e81d9433bcd076f52853b1a5edd07dae66093bc4e1eca6818abe1786d052433ad262133ea17f6dd930e6b68ea86dfbb256dfa07f46e672de27cc2d"
}