Event JSON
{
"id": "667d636aa1920b7a57dcd26616bea270e651c3e6740d63e63815dcacdd3cfc18",
"pubkey": "5aeb250b3075a12bd05e16c8a3c40da91a553fa92164a39915a3a0615fe51864",
"created_at": 1724781733,
"kind": 1,
"tags": [
[
"p",
"ae1c89a6928dc601b3b0c2e29b456928ad6188012c19d9cec882587b7e23653a",
"wss://relay.mostr.pub"
],
[
"p",
"867b16fbdb961d3620b6e6c1dd0b0124703c4db31d6d71096b866e54dec93560",
"wss://relay.mostr.pub"
],
[
"e",
"9fac3cc31e683ec46b80b6c5a416668d88033a862011c26702ce1ed62262239e",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://mastodon.social/users/hyc/statuses/113035295673503910",
"activitypub"
]
],
"content": "nostr:npub14cwgnf5j3hrqrvasct3fk3tf9zkkrzqp9svannkgsfv8kl3rv5aqyyhfwc essentially, the OpenSSL guys want the behavior that a 2nd OpenSSL_cleanup() call should always crash. Frankly it goes against normal C programming practice, such as free(NULL) being a no-op.",
"sig": "d77d914364b3dc631efa95ce124e8dac4323c923fc29043cf92927b6a664090bb7d040487ef5e9c08eb27f517e1df05b275128a89cb80b19fcec82b693f8eddb"
}