Event JSON
{
"id": "65456af992c5ebb36299ad807c3e98671bfc9599db6099dce1858f1307ddb0d2",
"pubkey": "55a8695b9cf3190d9ce185047c3f8d26967b811731996cd0a62ee8762f5c96cf",
"created_at": 1737383577,
"kind": 1,
"tags": [
[
"p",
"bae8a55719fd9f3c1a7d1914df5af030c3e8c6dd57b44f93d6d82b81b5156329",
"wss://relay.mostr.pub"
],
[
"p",
"2e260fe2357fa3aa38d771488009d41162178ab9cf476f00117981b162e6e88e",
"wss://relay.mostr.pub"
],
[
"e",
"0e2548b48c8963b225b38b675f13477a793cb72d0fdf850becc85187ac6aa0f4",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/0xabad1dea/statuses/113861170153163706",
"activitypub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqht5224celk0ncxnary2d7khsxrp733ka276yly7kmq4crdg4vv5s23qgqt in theory that’d help but in practice I’m usually handed incomplete source code for weird targets with no build tooling (I am a security reviewer) so shoving it through the compiler at all is a nightmare",
"sig": "a9f80684b0ef1c6d0c22b73dcec7c431b0f0edce738e45d76def559cc316eb7959584cf552b8c085bd6d8cf949cd8edbbfeb751c48fa5bb8bc9df94c7830b049"
}