Event JSON
{
"id": "15878875243f63ff0460e9d898ab3d4b8b727295f46ca0f8b08585aeba03cc91",
"pubkey": "1ba6afdb8371a9b8a1abe1d403564add435ea43f780f123b14ca9a55ab4a805b",
"created_at": 1686518389,
"kind": 1,
"tags": [
[
"p",
"d48e92e5c7ed3d60ca613d7f4ab5789fa538adcd106191b5b7c8568212d579b6",
"wss://relay.mostr.pub"
],
[
"p",
"ab7fa1ed643ffc34bdda98c18108cf3e39032a30437aad496dcfd3988b0bd0df",
"wss://relay.mostr.pub"
],
[
"p",
"277c6a290699ff0dd3474ade6851305ae20f5bdf2f15e1400c21d870b0475426",
"wss://relay.mostr.pub"
],
[
"p",
"812a4bc6a6f71a0417b505d2f9713ac5f8486057e33a307ebec77bbb9ef69205",
"wss://relay.mostr.pub"
],
[
"e",
"13c601fa84b78971823f09603ddca02da93e7ab634850c0a77d2a362c26783bb",
"wss://relay.mostr.pub",
"reply"
],
[
"mostr",
"https://mastodon.social/users/kepano/statuses/110527669147204690"
]
],
"content": "nostr:npub16j8f9ew8a57kpjnp84l54dtcn7jn3twdzpserddheptgyyk40xmqz80y7m nostr:npub14dl6rmty8l7rf0w6nrqczzx08cusx23sgda26jtdelfe3zct6r0sjfa40d What you are saying is a syllogism. If the goal is to verifiably prove E2EE, then FOSS is one path that apps can take. But it’s obviously not the only path — the business model and security model are two different things that can be independently scrutinized.",
"sig": "030ad3702fb810300321438de427e80e5e7945234f47fcd2fc202276e077dca651b9e3c29d7c44a874728937bb8d268e5b84f52cad416b24bd3a15abee5d0755"
}