{
"id":"153680671ae78ed1d60469205a278ffb37cbfc2484f9d5428b8a23810a48f9d5",
"pubkey":"0371db7fd4437ce63e60dedc313cad6ee8b17fc691fe05231f9a140134fc0d08",
"created_at":1728159484,
"kind":1,
"tags": [
[
"p",
"e88a691e98d9987c964521dff60025f60700378a4879180dcbbb4a5027850411",
"",
"mention"
]
],
"content":"Different hardware wallets have different secure models and tradeoffs to defend against various types of attacks.\n\nnostr:npub1az9xj85cmxv8e9j9y80lvqp97crsqdu2fpu3srwthd99qfu9qsgstam8y8 and Lloyd Fournier discuss some of these attacks, and how the risks can be minimized, in BR073.\nhttps://m.primal.net/LMNp.mov",
"sig":"632a992fe0f48dcd3e6121617b416aafcc66ec64354d0000cb1228fdee3cb41b4b962c7efc00325613caa0b95eec69e85b7555fb0acf8946f4a36d9e9bff146a"
}