Event JSON
{
"id": "579744aede71f8dae3c200b7d8000265401ff41d2cfe4c2ef54f5e6e8185defd",
"pubkey": "1a34cf50015820c7ba2af6ea32baaf6ef484ef58ac672feecc8a59fb37ffd286",
"created_at": 1731931017,
"kind": 1,
"tags": [
[
"t",
"infosec"
],
[
"t",
"cybersecurity"
],
[
"t",
"hacking"
],
[
"t",
"pentesting"
],
[
"t",
"security"
],
[
"imeta",
"url https://files.defcon.social/dcsocial-s3/media_attachments/files/113/503/831/094/753/794/original/d294c72f4f37ad86.jpg",
"m image/jpeg",
"dim 1080x1485",
"blurhash U67T@NxKIoxb?Ks;WBW;$,ofWBkB$lofR%of"
],
[
"proxy",
"https://defcon.social/users/Cyberkid1987/statuses/113503831181600709",
"activitypub"
]
],
"content": "Types of Cryptography Attacks 🗝️\n\n📱My Social Accounts: beacons.ai/cyberkid1987\n\n🔖#infosec #cybersecurity #hacking #pentesting #security\n\nhttps://files.defcon.social/dcsocial-s3/media_attachments/files/113/503/831/094/753/794/original/d294c72f4f37ad86.jpg",
"sig": "4a044c754c6b90a22f7526f3d4a14d08a903b6566f8e5c34612eb9c4d3c810379fe068401917926348cb61d5cd93f26452d24f20bbda98fa8cfc52e91ce88ec9"
}