Event JSON
{
"id": "793a46d63a66e213e01504d98bef1fb3c5677d921a6a6e94064c0302b1390f8a",
"pubkey": "d0d29fd9819bb2d14b5a485e42e4ef1c559ba30e320f3b3e54785aa2ffc5974f",
"created_at": 1709684478,
"kind": 1,
"tags": [
[
"p",
"7c36db824c59de35f911da00c75d86854173a72ea04894434ec1ba1f3aac1fe3",
"wss://relay.mostr.pub"
],
[
"p",
"5ab0ff62d0dc33bfa5c3380d991e650e4c28b949f6d524e2ef77068e8ebf37d5",
"wss://relay.mostr.pub"
],
[
"e",
"bfd5013fd2f44593bebe5ced20d55dbc44397a3d4b0fb4f75b82cb0b52f059d2",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://hachyderm.io/users/dalias/statuses/112045882002203848",
"activitypub"
]
],
"content": "nostr:npub10smdhqjvt80rt7g3mgqvwhvxs4qh8few5pyfgs6wcxap7w4vrl3spfhjqm I don't want processes running as root to magically appear and become attack surface because some application I was running prodded a dbus address and dbus activation ran a daemon that happened to get installed as part of some package something else depended on.",
"sig": "1975c9a36075ff8cfd9a36c77d7ec38b5c3aa349dc374abb6dfb2b1b35c285c2ac2c18e1e741d5267e9bd00e7fc309c1e270bf159051b77eca936e217219fdaf"
}