Event JSON
{
"id": "26e886e3cb6eede9fd769e0b7214008df022b2dd0c8e37fac9a22fa6f66bd44f",
"pubkey": "f39833f08e0f05972be0604735d51ec700fb118d49d02a79bf6447093138c8e2",
"created_at": 1724163771,
"kind": 1,
"tags": [
[
"t",
"debugging"
],
[
"t",
"reverseengineering"
],
[
"proxy",
"https://infosec.place/objects/a77bdcf4-adf0-4c4e-b449-6c8e87d13370",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.place/objects/a77bdcf4-adf0-4c4e-b449-6c8e87d13370",
"pink.momostr"
],
[
"-"
]
],
"content": "Apollo Comms Part 32: Breaking the Updata Link Code\r\n\r\nhttps://www.youtube.com/watch?v=tBy1j9cTYKc\r\n\r\n#Debugging #ReverseEngineering",
"sig": "ba12c7ffde583b2dcfa0f715db4a7664ff80c96e437b349d61be85fb06646ca13e75c86d59c0908cb4694b27570afecf651019d8278527bf031e28a2a9b3db07"
}