Event JSON
{
"id": "60958ee64d7613360c6eaac5d1cc96f26178e7170c7b5e41f6a03f5c7b1304d2",
"pubkey": "fd78ea493e466e5403543ba50475e8acc79157ea3bab423b53f780a89c92423e",
"created_at": 1733212406,
"kind": 1,
"tags": [
[
"p",
"8231bc5879fef666a8cce88bd8b5583f251e6500df0eded64822bd5d313bb9b7",
"wss://relay.mostr.pub"
],
[
"p",
"57e511a8900d7077984bc15b9f7b2ffab05e290f7c085b50aa7b432a0d956589",
"wss://relay.mostr.pub"
],
[
"e",
"fb77002b156ccd48f758a4adb09bec8de9872050e1da6e597218fc8d3c3ba6c9",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/tychotithonus/statuses/113587808249814160",
"activitypub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqsgcmckrelmmxd2xvaz9a3d2c8uj3uegqmu8da4jgy2746vfmhxmsnedun3 I just tacked on a 5-word passphrase from a 20,000-word dictionary -- something I'd consider to be sufficiently bruteforce-resistant all by itself. (Didn't think too hard about the timeframe since the combination of that, plus the rest of the contents, seems pretty far out of reach.)",
"sig": "8f62adb17642f68329cf7f84aee1a5c071108fe8c025d5e3161562259a6ac283ff4fb0ee92420e2a240b652a6c3943ca78c4159835c11d9b0ede0e0f01dc10b0"
}