Event JSON
{
"id": "10e51533f429f63e4b92ed48cefe152402b5dba6aed427150563e235e394184a",
"pubkey": "1a5ac5b37984c5e37a11bc914029a81f025326ea7950c9475d9a3f21a494cb56",
"created_at": 1731023509,
"kind": 1,
"tags": [
[
"p",
"2d3396838d5dc428765c17af11a186d8220ebe08984e57666d4422125d9cdad6",
"wss://relay.mostr.pub"
],
[
"p",
"ecd4de6c1f129df8c61f21456125bb6e121792af06a5c1fb221b7d99f9e95805",
"wss://relay.mostr.pub"
],
[
"e",
"50a804d83571393eda7853522efa9ff6d9b310fc759ed1f0165885d5c3071213",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/briankrebs/statuses/113444356717503153",
"activitypub"
]
],
"content": "This reminds me of a current situation I was talking about the other day with nostr:npub195eedqudthzzsajuz7h3rgvxmq3qa0sgnp89wendgs3pyhvumttqkw388s: In the cybercrime arena of monster cryptocurrency heists, more often than not now other criminal groups figure out who made the big score, and then target that person. That is to say, the crooks are figuring it out and acting on the information faster than the feds can.",
"sig": "93e1ecfd96c0fdbbed26e5a66cf5888be0acae9f2793b8432bb782a8fda7efc390d63046d958107d40f2a8499e822f63c46720328f2ea8d98f51f8f0333317f7"
}