Event JSON
{
"id": "d39bc8952e13e846e07b164114b23d393270f94bd90ebd94d6c111b5853bd8de",
"pubkey": "e0a2a2e9c3b6486e48f7224d2da5af46ae432d4a2096130fadd30cfceb0b792c",
"created_at": 1703197152,
"kind": 1,
"tags": [
[
"p",
"f7d0478e54eaa6e0cc98adf81d712148bce169a2c21b1c0f7a4ed446c6adc09e",
"wss://relay.mostr.pub"
],
[
"p",
"f6870afcde4480ec8508f50304859e14a51309ff24ab3f0f862c52bdc4af8747",
"wss://relay.mostr.pub"
],
[
"e",
"5a9bc3cb759bca914286886a0972c412c87271d3accd2e0cad09a396478f71b4",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://mastodon.social/users/callionica/statuses/111620728568716231",
"activitypub"
]
],
"content": "nostr:npub17lgy0rj5a2nwpnyc4hup6ufpfz7wz6dzcgd3crm6fm2yd34dcz0qlk9uux The short duration is relevant to decreasing, but not eliminating, risk, but the current use of the domain is not. The attackers can put the domain to any use they want when it’s their server that owns it. Suppose the attackers had their shit together and validated some GitHub accounts using that subdomain? What if your customer wants to start serving some app from that subdomain in the next year?",
"sig": "84abac70821508c7e0819acea32e449405b8198ea9fd82a263c2d1844b381a1a036ec780cdabfe74891e9e002a5eb47bd1d304395300db213ae7532ee07283e2"
}