Event JSON
{
"id": "cc12c120a06e38102de4f11a30e7942061ab0c50fbe0156cb41361c14dd6779f",
"pubkey": "0371db7fd4437ce63e60dedc313cad6ee8b17fc691fe05231f9a140134fc0d08",
"created_at": 1724319657,
"kind": 1,
"tags": [
[
"p",
"e88a691e98d9987c964521dff60025f60700378a4879180dcbbb4a5027850411",
"",
"mention"
],
[
"p",
"d987084c48390a290f5d2a34603ae64f55137d9b4affced8c0eae030eb222a25",
"",
"mention"
],
[
"p",
"cedab81be42ef47dbde653f4ba7ab25ac3aa32cfc2b672ee0f89c0faf882f13e",
"",
"mention"
]
],
"content": "A recent Telegram zero-day exploit allowed malicious APKs to be sent as videos.\n\nnostr:npub1az9xj85cmxv8e9j9y80lvqp97crsqdu2fpu3srwthd99qfu9qsgstam8y8 , nostr:npub1mxrssnzg8y9zjr6a9g6xqwhxfa23xlvmftluakxqatsrp6ez9gjssu0htc and nostr:npub1emdtsxly9m68m00x206t574jttp65vk0c2m89ms038q047yz7ylqcac9aw discuss the exploit and the security questions it raises, in BR072.\nhttps://m.primal.net/KHnB.mov",
"sig": "dca822e561f40ed6d9ba51ef72f78428dba8218ee18683ab010f308de25586f9b43a7ec9ec799fb5968cdca9b89f9532f6e095f51b788228374fb86ff3fb389b"
}