Event JSON
{
"id": "9cad3f7614f5971b23252f338afc2908af77a0f34443f650045610c4f76a2e61",
"pubkey": "c7d603a3427bdf7795c737e6c93b71c2e2b36be5af95473fd02fa9524c3479d6",
"created_at": 1692196174,
"kind": 1,
"tags": [
[
"p",
"fc501b6983e35071ebd0703f9353bf61717a1615fbabab5b57cdb86caa71ee05",
"wss://relay.mostr.pub"
],
[
"p",
"c95a71dfb95245bfb233a5ccea6dbcb03adda051221413144a54a206165aa52f",
"wss://relay.mostr.pub"
],
[
"e",
"25c42a3299114d280f9b49c5f6059fc09a50e92fcf465d8af3882245fbd627ba",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://fosstodon.org/users/benjaminhollon/statuses/110899768484012979",
"activitypub"
]
],
"content": "nostr:npub1l3gpk6vrudg8r67swqlex5alv9ch59s4lw46kk6hekuxe2n3aczsyqvu48 With very large limits, there is a danger of a DoS attack of using an extremely large password repeatedly to force computationally expensive hashing on the server side. But 50 chars is in no danger of that, to my understanding.",
"sig": "c73dd909f3a2bdf6977987b3af4754f4d9a3f4a05b03a6592c756d18c6098acafa965332535035f8266cce31762ca061da6a96eac53e758e547b24eda87f7ff0"
}