Event JSON
{
"id": "02d818a4e2f043ec1fab14fbc5abf3bfcd2f9600a135d10305d23fcfd3625d92",
"pubkey": "70d6e3e4853fdbcca8ac01c56b81062f718cb1ce70d3ad71f5b9538f46ff5d41",
"created_at": 1705489865,
"kind": 1,
"tags": [
[
"p",
"30370bab3bff79a9ba7acd3a52492dd54aa46dc05d8731c933be389aca5a3a7c",
"wss://relay.mostr.pub"
],
[
"p",
"932bd2206e69be8e7ddc4ca7d5713c7a14f6f6a54f3b7fc8a554517cdefd8e6d",
"wss://relay.mostr.pub"
],
[
"proxy",
"https://social.v.st/users/th/statuses/111770983837168039",
"activitypub"
]
],
"content": "The disclosure timeline for nostr:npub1xqmsh2emlau6nwn6e5a9yjfd6492gmwqtkrnrjfnhcuf4jj68f7q28m3q3's PixieFail is hilarious and mirrors my experience of trying to manage disclosure of firmware vulnerabilities with IBV/ODM/OEMs. https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html",
"sig": "2d62892b0b8171acfbabc0189c769e1b27d1ac982f285a47cb12fba357940191b63dd925ef27d52a42ab041f000854c1745372939100abc3b4fd57d47b3e3b02"
}