Event JSON
{
"id": "63e9fb84fc7143b1b6efdc6436de17dd41c429b4b9e49ad52ea85c7969cb8341",
"pubkey": "e5933640230bc561becec08c36082ee7847e0c8a47da35ae61270b1553077ecf",
"created_at": 1731009957,
"kind": 1,
"tags": [
[
"p",
"726b54337caa3467a1ce92073fb9e93b4db61bd72a8b67d3ce730f7774f8f835",
"wss://relay.mostr.pub"
],
[
"p",
"1a5ac5b37984c5e37a11bc914029a81f025326ea7950c9475d9a3f21a494cb56",
"wss://relay.mostr.pub"
],
[
"e",
"ba7ef95a3f5466f4a0eafa69e63cc005db6ff2cbe1e1c8c80909c1c30e02d9de",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/tasket/statuses/113443468589297438",
"activitypub"
]
],
"content": "nostr:npub1wf44gvmu4g6x0gwwjgrnlw0f8dxmvx7h929k057wwv8hwa8clq6snr94wn Everything in IT is now geared for consuming centralized services with abandonment. From that we get A) device proliferation and B) abbreviated or missing controls that dip below the point of irreducible complexity. With GenAI, we can add C) theft, obfuscation and false results.",
"sig": "9ef0207477ad91b726aa2774bd570151ef5e1f292ed4e270368d1e0fd22f4395aacc15ecedf94965eaab4ad36b1fa68e918afb7614399e843f7b66afe0edc5cd"
}