Event JSON
{
"id": "caef5aa40dc43734d6ac0f7ed7410a51e4f74ec15df254864f142e5455453918",
"pubkey": "e1346ed3dc0a8854bbd7cb7c4b4e6c6fa3e6894a122adf4df6a6d0ff6fa11922",
"created_at": 1707599893,
"kind": 1,
"tags": [
[
"e",
"d7e2f5c8f670d02ece71226c653389d9df50e927d4e7b0fbb6b3f7e99c22e600",
"",
"root"
],
[
"e",
"062d2c70e54c65163d1200e9856b53be7e89a8efaa1d5937642cb62b9cdf3d79",
"",
"reply"
],
[
"p",
"4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d"
],
[
"p",
"6bf1412f5e48bb7290851d3e3da1a2d0e3fbbb0448d213712e92c4181af7c553"
],
[
"r",
"https://blog.securityinnovation.com/creating-your-own-personal-threat-model"
]
],
"content": "Maybe this is a good primer? \n\nhttps://blog.securityinnovation.com/creating-your-own-personal-threat-model",
"sig": "8239baa080e8f4fd569f0c1854509d4838912ebc9f7f0cd08490f3a1ebe98c341034275cbac77ef65f7723bf66d828d6ba9467009c90f5770205b9162789320e"
}