Event JSON
{
"id": "831a21e08c7169e8516dbfb7f0c6fb5491b3ffde643b16efc1ea8ec4c7083b71",
"pubkey": "f01d97dd38ecb2b9da5504374ec91fa2adf03c910887f6fb2c7ef555f89d4460",
"created_at": 1731073055,
"kind": 1,
"tags": [
[
"p",
"8b189dd1b2fc49e21c72991ca722a0248dabced8ad71378dae7eba8760f6b2d8",
"wss://relay.mostr.pub"
],
[
"p",
"f7e3557533701fc3b74cf5e2a7ae8a19207dc6eead2dfafa5b436bb8b5637299",
"wss://relay.mostr.pub"
],
[
"e",
"f748ea83c715e9c339f709eb90cae1c3f292b42477a7e985df679f543001cb40",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://mastodon.social/users/jimkessler/statuses/113447603761181629",
"activitypub"
]
],
"content": "nostr:npub13vvfm5djl3y7y8rjnyw2wg4qyjx6hnkc44cn0rdw06agwc8kktvq8a0sze I'm curious if you have a standard spiel - or a proposed mitigation plan - when a user presents you with an app or operating system that's no longer receiving security updates from the vendor (e.g. macOS Monterey and earlier, Windows 7, browser versions that top out with older operating systems).",
"sig": "cf6c280f0343a6fadd5d6bf5c7654379eec99111fccf64de5bd21e7460b06f1f7c070cb170259149731e66e49f84caf0c9e9a798d87671642057225578f379ab"
}