Event JSON
{
"id": "d2be13e2d75581ab77126232078dd32682917d599ca01c5dc34d07e37caa34a9",
"pubkey": "dd407bfb6eb412332cf09b0f30fafe1826f6d6cdd986342adba543b25b6ab11d",
"created_at": 1705171182,
"kind": 1,
"tags": [
[
"p",
"5f9bb1a8dcc9c5d340d7228d66cbaf99b493e38721ffeba6d0714e4f7a2d9590",
"wss://relay.mostr.pub"
],
[
"p",
"ae3bf73746446a5edd319cef72033b539598a21ad07c2c2c4a84fbeaf22b835a",
"wss://relay.mostr.pub"
],
[
"e",
"980fe847459be758704eb579c7c9c27e63b9ebd8b6e9d3fe93e207fcbc3cab87",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://sfba.social/users/soaproot/statuses/111750098641623724",
"activitypub"
]
],
"content": "nostr:npub1t7dmr2xue8zaxsxhy2xkdja0nx6f8cu8y8l7hfksw98y773djkgquzpqpp Do you have any way of knowing whether those instances have local patches or are on a published fork which is behind? I mean, that's not a good reason to leave security holes unpatched, just another factor in a space where people do not always want the default behavior.",
"sig": "1576bba8d0a8ec6e7c9cf71b986f2068fcb00a5a3056c2ec62abd3d9132c46afb77b06b969bffc1519b998d37ab4f6758b0a7d1aa20b148d49dc3a28581df655"
}