Event JSON
{
"id": "8885c1575870c570940ae7dc36b751195e86ebef7ab919a7690f09da37405fc1",
"pubkey": "abbc753fd9fc0ec851266f2f7677ef19448e482955af80113cbeecb52fe46608",
"created_at": 1740933208,
"kind": 1,
"tags": [
[
"p",
"56ac23117d591344147224eee7e2d03c81148e90adda63e7fc64846e09358033",
"wss://relay.mostr.pub"
],
[
"p",
"54c5cf3f3f91ed490315d610d6941e036af30ac450d8b723fbd40d1b37d8e1d9",
"wss://relay.mostr.pub"
],
[
"e",
"ea625ff11ebffaa74fd184d3cc8a66ab76df8a853608a9a0026819637fde724e",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://vt.social/users/lina/statuses/114093798740747083",
"activitypub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpq26kzxytatyf5g9rjynhw0cks8jq3fr5s4hdx8eluvjzxuzf4sqesl493ny I've implemented that in a past life, it forced all users through a password change flow on login if the password was a hit on Pwned Passwords (implemented as a Bloom filter for performance, designed to have an acceptably low FP rate).",
"sig": "dd720fd24db77a0715acca83c042ba55497caae6049a8ba72e8a387e5b3131ad165734bad0a567dbf3fa8eee0966e22d32f8f9c0f1a3a8895bb3fec77319b320"
}