Event JSON
{
"id": "3f47f8d01b5ef84b1b9bb982d9446a16bb0bc5ba29546f4f44f04bcbc1fdf531",
"pubkey": "7776c32d4b1d1e8bf2a96babeb43ad9ade157bd363d89b87fb63e6f145558888",
"created_at": 1736523143,
"kind": 1,
"tags": [
[
"p",
"7776c32d4b1d1e8bf2a96babeb43ad9ade157bd363d89b87fb63e6f145558888",
""
],
[
"p",
"e9986a10caaa96738ceda88aabd3e184307be5143e687457581f9b096c6ef89c",
""
],
[
"p",
"1bf9f239dca1636149bc2f3fc334077ae959ea9607cacf945ef8f8bb227dc5e1",
""
],
[
"p",
"7cc328a08ddb2afdf9f9be77beff4c83489ff979721827d628a542f32a247c0e",
""
],
[
"p",
"50c6ce2e69cf0baf79b52488b20418c4a6f9ca7bd0ac654b4624d5c025cf57db",
""
],
[
"p",
"516add19a861a2f429ccc883fe73243179d5298248c827d68fafe822e697c014",
""
],
[
"p",
"5468bceeb74ce35cb4173dcc9974bddac9e894a74bf3d44f9ca8b7554605c9ed",
""
],
[
"p",
"516add19a861a2f429ccc883fe73243179d5298248c827d68fafe822e697c014",
""
],
[
"e",
"0a8dc2389ed858d932cca6b90397e762a62ca0fe547334e5129dd42a5a37c05b",
"wss://relay.mostr.pub/%20",
"reply",
"5468bceeb74ce35cb4173dcc9974bddac9e894a74bf3d44f9ca8b7554605c9ed"
],
[
"e",
"19ac28be365db3e8bbbf690d2f87b00b9fb1f6d74b142a923576b62178a60031",
"wss://a.nos.lol",
"root",
"516add19a861a2f429ccc883fe73243179d5298248c827d68fafe822e697c014"
]
],
"content": "So it's unclear whether you believe there are modern phones without hardware backdoors, or that hardware backdoors are compatible with end to end encryption, or both.\n\nRegardless, there are hardware backdoors in modern phones, and that makes them incompatible with the concept of end-to-end encryption.",
"sig": "205d5306b21ee68e292fe5cc8452f06b36c39722ae612d35aae13793d3866b2b77f2562c378e67d4c94f1ceea74725e5a5bbb2092171cf87cfaaad43998a1535"
}