Event JSON
{
"id": "d885267350e8fbc5fd16575b32d13adb2f9776d5d003bf65b1d2d49c74774aba",
"pubkey": "ef5e80e6c74387ef14f5c6b89079f22b6847dc14365001c0ed662a20bd891677",
"created_at": 1722010937,
"kind": 1,
"tags": [
[
"p",
"0329d58045b1714a80f851ec3eea09eafaf75bcef1a88b0e6dc9d9b366885bde",
"wss://relay.mostr.pub"
],
[
"p",
"c35a8fae05a838b863707803bb1fdfcfcbb39adcf01ee1a9fc52ef44998ce4c0",
"wss://relay.mostr.pub"
],
[
"e",
"61a49e7739cd811b858d69da4f04d2f60836fd003e84a48e377e5a3c7e286812",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://nondeterministic.computer/users/mjg59/statuses/112853708791812932",
"activitypub"
]
],
"content": "nostr:npub1qv5atqz9k9c54q8c28kra6sfata0wk7w7x5gkrnde8vmxe5gt00qdjk9w9 It doesn't even need to be user mode! Crowdstrike on Linux can use the eBPF security module to run code in ring 0, but it's in a safely sandboxed environment",
"sig": "7c975195a82e062d8cec30cf3f521dede793202556cab3e04b6a05a48494e3dc5557577a5c0e2d4de58cda5a818aec45721dfc59adc302b8cf5415576cc6308b"
}