Event JSON
{
"id": "613b53e976c0481968abe85062c00469f0c55628b647e61ab56832d9ea0e5695",
"pubkey": "9c7b9756690880e06dd0ac4246c1d27e99c2f9d8beb819e2e3156dc3e2d8d3e6",
"created_at": 1709610502,
"kind": 1,
"tags": [
[
"p",
"f7d0478e54eaa6e0cc98adf81d712148bce169a2c21b1c0f7a4ed446c6adc09e",
"wss://relay.mostr.pub"
],
[
"p",
"f6870afcde4480ec8508f50304859e14a51309ff24ab3f0f862c52bdc4af8747",
"wss://relay.mostr.pub"
],
[
"e",
"1f0d97d0f6c08347039a99b9146422f19b27602d5c7c8fe7f0d3abffc74fd5d5",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/wdormann/statuses/112041033922879909",
"activitypub"
]
],
"content": "nostr:npub17lgy0rj5a2nwpnyc4hup6ufpfz7wz6dzcgd3crm6fm2yd34dcz0qlk9uux \nMy take:\nIf admin-to-kernel isn't a security boundary that Microsoft recognizes, then it would be well within Microsoft's rights to not bother to fix the vulnerability ever.\n\nhttps://media.infosec.exchange/infosec.exchange/media_attachments/files/112/041/032/668/304/726/original/2db22fa3e82399a4.png",
"sig": "6615603bc902d46d67e57508ef0208cabcd54dd4e540f881056ce31632d53dddec9664d9e63b99a84a53ed126e5663f9d9cab7c4986f4d594d65073df8d6941f"
}