Event JSON
{
"id": "9e05dd5c1106c3cc0d4f76a7a7e4c838810f72c26ae94b04e5bfc9aa5cc932d1",
"pubkey": "781cccbe3d5e0c84a2e86027d4b68ee78fb6c79534cffbc3ec8b4eff796af0e0",
"created_at": 1689432564,
"kind": 1,
"tags": [
[
"p",
"425a31b8ba51406731ddec58e9b0575f41c5629b2b93a661d29edb3bc3d7fd65",
"wss://relay.mostr.pub"
],
[
"p",
"cc3790930722bfa73e28f9a2aa0832706884305cb80687e20927c7960db99185",
"wss://relay.mostr.pub"
],
[
"e",
"d4950412c846d2bb0ec915b9a49de92b92e97370bbdd656c30bf488b5adbd9d3",
"wss://relay.mostr.pub",
"reply"
],
[
"mostr",
"https://mastodon.social/users/Alonely0/statuses/110718652575483980"
]
],
"content": "nostr:npub1gfdrrw9629qxwvwaa3vwnvzhtaqu2c5m9wf6vcwjnmdnhs7hl4jsux7gg6 Right now I'm really deep into the AES rabbit hole. There are many extensions for fixing different attacks, and quite a few different implementations. I'm implementing a better TOR protocol and I want to do it on my own, doing my own research and experiments. When connecting to the nodes, TLS is not used to not completely depend on certificates (there is an extension for it on my protocol). However, that means RSA and AES are on me.",
"sig": "cdd826af599aaef4b28b0ab74423af261f728e82399c1327d09af4f40168a2c77408f6c111ffdedf38a8b21e8ddd52540be356e13edf3582c1fc8dc0185fa5fe"
}