Event JSON
{
"id": "3512c0ed3ee901c96d69c4bbd2ec687aef3441c58af77a5702f13b031b2550f1",
"pubkey": "0abc897a05eca0849f658dc45fb983e46041d357150b09df857131e7a7552848",
"created_at": 1730289564,
"kind": 1,
"tags": [
[
"p",
"d16df93b856ce10a66a65b38d719496279e013829038764766bc012e34bf6fbd",
"wss://relay.mostr.pub"
],
[
"p",
"728a1eaf2d8bfb5fa32df61a4e657ab5717df351d47c6782d5f29209c55d3c6f",
"wss://relay.mostr.pub"
],
[
"e",
"59fb7beceb1101de33dc8da25f20da20b0f7f444b9c5c6442e3e8a5ded760966",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://fosstodon.org/users/nobodyinperson/statuses/113396256889017416",
"activitypub"
]
],
"content": "nostr:npub169kljwu9dnss5e4xtvudwx2fvfu7qyuzjqu8v3mxhsqjud9ld77supy070 Nice! I worked on something similar: Teaching security.acme to use the TLS challenge, so you can get a certificate even if port 80 is blocked and you have no influence on the DNS:\n\nhttps://github.com/NixOS/nixpkgs/pull/340136",
"sig": "663635902759e9049ccbb446243c26452c211a3dc516735cee085ee34f390ce295ca566b7887226218f07649dbe5d2c6073a64c2303ef0b7e7401c73958eb7a6"
}