Event JSON
{
"id": "01a08ae369c89d36cb879d2d7f5e8ab34358f4ba3ca58144173a89796e95f7d3",
"pubkey": "8e3ac11e1cfbd1959ffff89d016fd2a6c159c4880cf4fe0274ac3852e21f2b88",
"created_at": 1686877370,
"kind": 1,
"tags": [
[
"p",
"3c745deb3224937af97787803fb018e1e4c208d3e1206f2b01620b49258b2fdf",
"wss://relay.mostr.pub"
],
[
"p",
"4b06a99655066ca3e1a19ecc4bd5c5fd5d0f106a319a8cfb3c414bdff9e17c27",
"wss://relay.mostr.pub"
],
[
"e",
"8f6a5eb062662f0bbdd7074229d333d917bb1d47a3da4f4d6721c71116ea3c59",
"wss://relay.mostr.pub",
"reply"
],
[
"mostr",
"https://infosec.exchange/users/varx/statuses/110551195344818920"
]
],
"content": "nostr:npub18369m6ejyjfh47ths7qrlvqcu8jvyzxnuysx72cpvg95jfvt9l0s5z8jp6 I feel like I've encountered a few pieces of software that zero out any copies they have of passwords, keys, etc. as soon as that information is no longer needed -- with the threat model involving malware that can exploit your standard buffer overflows and such in order to read bits of memory.",
"sig": "c615120d191645deb1f9e557800ef2b5bfc0cbaa781c413eed009f81282a6db2cbc652a9fb871574bdaf2b90ea15bc4c589020f370e142afc9ed19317d3184b0"
}