Event JSON
{
"id": "5fe224bf04edb81c5c2605bc8ef57cc407e1fb2e8e01f3b9cccf9ca4804fe09e",
"pubkey": "7c87470aa1d2e9727247b53d76e0295fb09be6497380b8ee6c9e8ee7a7f2fda1",
"created_at": 1700516032,
"kind": 1,
"tags": [
[
"p",
"956f16c5014877896aa5681df70ef31edcad9c82d1bce39751902d0247893094",
"wss://relay.mostr.pub"
],
[
"p",
"7c87470aa1d2e9727247b53d76e0295fb09be6497380b8ee6c9e8ee7a7f2fda1",
"wss://relay.mostr.pub"
],
[
"proxy",
"https://infosec.exchange/users/haveibeenpwned/statuses/111445018725658165",
"activitypub"
]
],
"content": "New breach: OMGPOP had over 7M email address and plain text password pairs breached in 2013 and subsequently leaked in 2019. 75% were already in nostr:npub1j4h3d3gpfpmcj649dqwlwrhnrmw2m8yz6x7w8963jqksy3ufxz2qumdf4l. Read more: https://www.cpomagazine.com/cyber-security/password-breach-of-game-developer-zynga-compromises-170-million-accounts/",
"sig": "275f625cfe40ac4e1b32035d1fe00c74d51224a1b4dfab4d9ce4f7da0daf1fba29caae6356025bf8709988d87ed68a9b8a9182224f163891a9861c7b47f1a2f1"
}