Event JSON
{
"id": "c1596ffad53dfcbf1e195481d70df296499f8cd42ed6600413afb707f93a9e01",
"pubkey": "b764dfce4744790ecaba851b29af6750c60a24d3792a14a8912039f0fb5becf1",
"created_at": 1737513799,
"kind": 1,
"tags": [
[
"p",
"52176b5778d3b20895b8abe4ae64fd81d4f8fc200d7a47f4a6714360e3c083e8",
"wss://relay.mostr.pub"
],
[
"p",
"856177dbe4b34f5a31a4930d3e093a30cbfbaf6a132626056f05d3e4c5e89298",
"wss://relay.mostr.pub"
],
[
"e",
"4baac0f01ed082ded44aad094c72fb5d7210ee46e4cd7e17c929f3ec06beb725",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://theres.life/users/arraybolt3/statuses/113869704382977314",
"activitypub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpq2gtkk4mc6weq39dc40j2ue8as8203lpqp4ay0a9xw9pkpc7qs05qyj6mjr This is really cool! I'm not exactly a cryptographer, but I am curious, are you preventing a man-in-the-middle attack with your encryption mechanism, and if so, how? (Every E2EE implementation I've ever seen requires the involvement of some sort of out-of-band shared secret to secure the connection, but I'm not seeing the out-of-band secret mentioned above.)",
"sig": "797acd7890b4f701304927412133308a87eae2bc578cf943cb542beba111702014bf64132cb29e398b713e28d5f9a6677853e39d046efebe807f5e7359660478"
}