Event JSON
{
"id": "7aefc6550b34648691f2e6962319c9f938fe949c381e66501e3cefdd478cbb64",
"pubkey": "213fab2c986489bc5cb7208142003791cb6efd20dae0ec4832d87d0d7b70d20b",
"created_at": 1711224755,
"kind": 1,
"tags": [
[
"p",
"32b91d74402bd4637efed10b60ee6c7a0d7faaa06678fc567ec03c48cf8ffdab",
"wss://relay.mostr.pub"
],
[
"p",
"42920182ecbd54819f8610fb7c231483ca9f642931a0135b7b9d16756634d277",
"wss://relay.mostr.pub"
],
[
"proxy",
"https://infosec.exchange/users/dangoodin/statuses/112146825547829322",
"activitypub"
]
],
"content": "nostr:npub1x2u36azq902xxlh76y9kpmnv0gxhl24qveu0c4n7cq7y3nu0lk4s8tux0y's coverage of the GoFetch side channel is easier to understand than the article I did. It also digs into practical considerations of the vulnerability. Well worth the read.\n\nhttps://www.zetter-zeroday.com/apple-chips/",
"sig": "da35a6468d5c6a3f21c3be56209fd88e8abc36e98d2a1278d6b23c727e6525f761bd41f8ba6102165ce7fa870ba424f264f7e07f1f4e90283688b28262e7ea8a"
}