Event JSON
{
"id": "972033ead72319b9d0eaefa0eac5517c3efc40d7ccba40fb4376ad675ce75966",
"pubkey": "91be5c15af34e54c65b1489763bacda05c31b1b5046e0c077cb3ae148d211d85",
"created_at": 1697501774,
"kind": 1,
"tags": [
[
"p",
"0ad0bff89a53f9fdac01812d9a903d9554800f8cbe699014bb749da9904aad5a",
"wss://relay.mostr.pub"
],
[
"p",
"d84d427460c5b35de0e276ceeb80d806eefcd05c71bb85afb8df4f48bd3231a7",
"wss://relay.mostr.pub"
],
[
"p",
"240808d34f92fac49a98804745b0726b2ae6c4dfd3abd04f555771293ecb143b",
"wss://relay.mostr.pub"
],
[
"p",
"39710decd8d524182da5daaa524407d5207c33bedb3bf95a4340bd8aa739b16a",
"wss://relay.mostr.pub"
],
[
"e",
"71e98399421bd9d52e61c676d94168a7c24aa662a016f947e5c1667fc88fc6f9",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://framapiaf.org/users/pmevzek/statuses/111247476262137860",
"activitypub"
]
],
"content": "nostr:npub1ptgtl7y620ulmtqpsyke4ypaj42gqruvhe5eq99mwjw6nyz244dqxq4hdh nostr:npub1mpx5yarqcke4mc8zwm8whqxcqmh0e5zuwxacttacma8530fjxxnslqn2a6 Yeah but this not the only attack. There is one FAR MORE spread. Company X installs, through a CNAME from their zone, something on $PROVIDER, which one does not validate ownership. Company forgets about the CNAME but keeps it in its zone. \"noone\" uses the name anymore anyway... up until someone else happens to register the given CNAME target, and like that you \"control\" a name existing in the company zone (until they figure out they should remove the CNAME, often too late).",
"sig": "2eda318b05d0b9c3af9e743ec307ac2a039aff490c33cbcb2a400b88347032af422cd619bcaef595fcb7cc85e289f00383be5fcfae18809e58e7f218d60d49be"
}