What is Nostr?
Kind 9802
Author Public Key
npub1zafcms4xya5ap9zr7xxr0jlrtrattwlesytn2s42030lzu0dwlzqpd26k5
Published at
2025-02-20 01:08:51
Kind type
9802
Event JSON
{ "id": "4469cf25e3a21cbc1fb2bf4c0ec12efa3e79f01c8a54b653f5ad330ac2574e29", "pubkey": "17538dc2a62769d09443f18c37cbe358fab5bbf981173542aa7c5ff171ed77c4", "created_at": 1740013731, "kind": 9802, "tags": [ [ "r", "https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger", "source" ], [ "comment", "Linked devices and QR as an exploit avenue in signal" ] ], "content": "Because linking an additional device typically requires scanning a quick-response (QR) code, threat actors have resorted to crafting malicious QR codes that, when scanned, will link a victim's account to an actor-controlled Signal instance. If successful, future messages will be delivered synchronously to both the victim and the threat actor in real-time, providing a persistent means to eavesdrop on the victim's secure conversations without the need for full-device compromise.", "sig": "b1bd983f68cc867191626a63068e8298065dcb2d447a99e71e5878d9d7da7f9de7883282847fddf191745ad2111619ef4e26ea63e6720e60a83b9d8e73e16b44" }