Event JSON
{
"id": "6d46dbe14044c305d6f3d03932403004353fc42eb7bd8b5e5119abf6d5c5a720",
"pubkey": "e83b66a8ed2d37c07d1abea6e1b000a15549c69508fa4c5875556d52b0526c2b",
"created_at": 1731789687,
"kind": 1,
"tags": [
[
"e",
"4fea93105da2ce10dde9d71e1fadd26f775deee215421269219d791871933dc0",
"",
"root"
],
[
"p",
"28d3b1c4c1ae1f6f656c3ac2d9bc2e470b12667e2b51bcabb663e5e389038c0c"
],
[
"p",
"7c765d407d3a9d5ea117cb8b8699628560787fc084a0c76afaa449bfbd121d84"
],
[
"r",
"https://securitymadesimple.org/cybersecurity-blog/fourteen-eyes-surveillance-explained/"
]
],
"content": "https://securitymadesimple.org/cybersecurity-blog/fourteen-eyes-surveillance-explained/",
"sig": "85713d95c9367ab4bff3a8e0266f1f1894a39cb7ca70408a53bd1b0e8a7eb7a4702669eaab3b7783a822df0a8bf729b7e83af05feb5466ed73c3ed5b4e90b43d"
}