dtonon on Nostr: It depends what the attacker want to do with your key. For example he could just ...
It depends what the attacker want to do with your key. For example he could just change your lighting address in the profile to forward himself your zaps. You can also use some tools to list all your events, included those that are not notes, but unfortunately it's not easy to detect if an event was signed by someone else,l. You have to take care of your key in advance.
Published at
2024-10-24 22:15:52Event JSON
{
"id": "9f279df97370621eda6d870019d6a0b7843240a3e7c0b51d63a8adc12f5cf32a",
"pubkey": "7bdef7be22dd8e59f4600e044aa53a1cf975a9dc7d27df5833bc77db784a5805",
"created_at": 1729808152,
"kind": 1,
"tags": [
[
"e",
"77fe6257536d91cbb4b88740cdf613b4402b4c34092267c22ed7946ce1d1f24f",
"",
"root"
],
[
"e",
"352ce357c2870c738c5dfaee7c5a5bb4fda8b836e8a896aebd0475e385679a6e"
],
[
"e",
"4ef4532399cf6afce5bb878c7e6443e7a528202e36722becf354c4666886b1e5",
"",
"reply"
],
[
"p",
"2f52b19fe1408f69ee0e909ed8fcac138c5f370c05de24f0d8370ada79752323"
],
[
"p",
"7bdef7be22dd8e59f4600e044aa53a1cf975a9dc7d27df5833bc77db784a5805"
]
],
"content": "It depends what the attacker want to do with your key. For example he could just change your lighting address in the profile to forward himself your zaps. You can also use some tools to list all your events, included those that are not notes, but unfortunately it's not easy to detect if an event was signed by someone else,l. You have to take care of your key in advance.",
"sig": "aaa94be2bd1397cbb2e171f0b95c3fce1b782040f49a9c1557a9b48c2aa7c02171f03179574d84bd24228441ffa4057fe07cbdc25dbfbad5d0d8dc1b86029dee"
}