Event JSON
{
"id": "7dd3d699d5ca025935a3da6281fd1e803ab2aa5d46c5f83e911e89aab104b55c",
"pubkey": "3e075405aa65efbaf38cafbc90fcebde679d56ad98f1f4d4f1a2bdecde94b665",
"created_at": 1736376630,
"kind": 1,
"tags": [
[
"p",
"0729a09d4e0bf980f3d2b3b0c62d2dc79d8df01668c0c106ceff8e36dad8b730",
"wss://relay.mostr.pub"
],
[
"p",
"f7d0478e54eaa6e0cc98adf81d712148bce169a2c21b1c0f7a4ed446c6adc09e",
"wss://relay.mostr.pub"
],
[
"p",
"55a8695b9cf3190d9ce185047c3f8d26967b811731996cd0a62ee8762f5c96cf",
"wss://relay.mostr.pub"
],
[
"p",
"f6870afcde4480ec8508f50304859e14a51309ff24ab3f0f862c52bdc4af8747",
"wss://relay.mostr.pub"
],
[
"e",
"c18142e8d451c9b9ec3161b1cde2e2188895782ea8df98e42a9649101c8cb887",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/dascandy/statuses/113795178842497823",
"activitypub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqqu56p82wp0ucpu7jkwcvvtfdc7wcmuqkdrqvzpkwl78rdkkckucqv036ma nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpq7lgy0rj5a2nwpnyc4hup6ufpfz7wz6dzcgd3crm6fm2yd34dcz0qrh5lc3 in an exploit writing training we had trouble making no-ASLR binaries, because it's always on by default and takes a lot of effort to turn off. How do they have it \"accidentally\" off on 95% of the executables?!",
"sig": "488f6afcf5cb403ab12a26fc0bf65fdae02938cc75b8e2ffd7c1a9e175d66d62ea97b9282f107287f6a2cca8dee8087bc750e866ea9ff5cf19cdc444753033f8"
}