{
"id":"433a7e3f50bbae8b73d538badabd3d74d9b2b1d318d574198115dafea0cb2c2c",
"pubkey":"0371db7fd4437ce63e60dedc313cad6ee8b17fc691fe05231f9a140134fc0d08",
"created_at":1726831359,
"kind":1,
"tags": [
[
"p",
"d987084c48390a290f5d2a34603ae64f55137d9b4affced8c0eae030eb222a25",
"",
"mention"
],
[
"p",
"e88a691e98d9987c964521dff60025f60700378a4879180dcbbb4a5027850411",
"",
"mention"
]
],
"content":"Most real world high value attacks use a combination of techniques. Several tools are normally combined to pull off the attack.\n\nnostr:npub1mxrssnzg8y9zjr6a9g6xqwhxfa23xlvmftluakxqatsrp6ez9gjssu0htc and nostr:npub1az9xj85cmxv8e9j9y80lvqp97crsqdu2fpu3srwthd99qfu9qsgstam8y8 discuss how some of these attacks play out, and the level of sophistication that can be involved.\nhttps://m.primal.net/KvgF.mov",
"sig":"b170c2f972252ff35d22b05785d8362afdade1f4da8a9686fa9b856cd7f917dfe005d8d45facd7a9ea0059026c7536ff39cb79f2972207306d4636b21894f49d"
}