Event JSON
{
"id": "540d3899d75d903249e107d872102ccb5a59e8443fe08e1cb4b934f8d99dbe7d",
"pubkey": "81487d30d3c2e98da8298b733a37f5f29339b11170102e8c9a0b6788171582da",
"created_at": 1735935770,
"kind": 1,
"tags": [
[
"p",
"fd87413d486a6b0a2c8997854c2d1f94bba09991aff8e50742ac9a8a25f5d7bf",
"wss://relay.mostr.pub"
],
[
"p",
"4a61f27d8f89674811f96b651c6e0d46f6185ee5776af22425eb27517d499fbc",
"wss://relay.mostr.pub"
],
[
"p",
"21d975b85a0cf618d87d10c271167934d359d2920d241deca805ada2384da58b",
"wss://relay.mostr.pub"
],
[
"p",
"9ce94d472fbfc49efc3c4c46acd8cde824027618053e509ef442612dee294863",
"wss://relay.mostr.pub"
],
[
"e",
"d7df089e313195ab9d183057250df07da6f8a9fa8396d7584b0b7c7e249baac6",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/lmk/statuses/113766286624495842",
"activitypub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqlkr5z02gdf4s5tyfj7z5ctgljja6pxv34luw2p6z4jdg5f0467ls9xxutp nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqffslylv039n5sy0eddj3cmsdgmmpshh9wa40yfp9avn4zl2fn77qsjf9kf I encourage people consider threats ad hoc if study/training is infeasible. My book covers the basics of threat modeling (and much more); an excerpt of the threats chapter is online at https://designingsecuresoftware.com/text/ch2-threats/",
"sig": "b3636210bc98d53a0d2aa2c9d6edf8b71f198ae3b9c01c3f5551c346c6d20a948dd0d14f9ba032d7c0fb12294f6d84a3a62535b123d5851916d16cf68f026a22"
}