Event JSON
{
"id": "b299930bf5bc115863e2b5cf9f302d846b516c2955f982bebbae667f84948f71",
"pubkey": "696b21818efd16c1e16066d79e27e4563a66219e6a3b05e57658db1e454d6ab1",
"created_at": 1721722082,
"kind": 1,
"tags": [
[
"p",
"39c11d1e2cc8bccaee7c449959a75c6c445dda6abfac8c7b42d06faeb58ea31a",
"wss://relay.mostr.pub"
],
[
"p",
"6c83d6b8c63e92641a76bad85be9f51dd4ae6a88c8a69362339ac6450c4f8491",
"wss://relay.mostr.pub"
],
[
"e",
"7be250b6ec2caa8bd430c4ede68aae6951f9c573aa8cd7de9720172bf93ddba0",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://twit.social/users/bouncing/statuses/112834778376246950",
"activitypub"
]
],
"content": "nostr:npub188q3683vez7v4mnugjv4nf6ud3z9mkn2h7kgc76z6ph6advw5vdqdj3jlx So as a Linux user, your contention is that a ring 0 privileged application, with root access to all kernel functions, should never be able to crash the system?",
"sig": "50b6edfb684418e2df0a992562c8b2dbe995f6ebd2417e539f13f35d0a25827db3540e621b95c51c281d098c0ba6db53928a77d7dfda8bff2074425349c9462e"
}