snort.social on Nostr: In that case. Pick a social circle. Clone the conversation content of all users in ...
In that case. Pick a social circle. Clone the conversation content of all users in the social circle. And then use the imitation domain name to do NIP-05 authentication. Then you can form a fake social network and use it for fraud, right?
Published at
2023-02-22 15:08:56Event JSON
{
"id": "271e384e32315435793fd06eb69be50ac8517a77e29c1c3302e0b3b4786b6d64",
"pubkey": "c575f51ad821202e1439e22008db81e96586c136a2f967650173cfc6912a1c26",
"created_at": 1677078536,
"kind": 1,
"tags": [
[
"e",
"ad80da9108624322ef9ca4c3e14474ec510aa22b3031a53430e2d7011e2fb479"
],
[
"e",
"f0c0fbc24995bb1c8793cf38aa899cdcf448011bea1518869a87f928d4a104e1"
],
[
"e",
"e447b31b4cc0b4aeeb4c19bc0b69c3ff0dfd49856397a1e517f9ae1dad5cc9be"
],
[
"p",
"3f770d65d3a764a9c5cb503ae123e62ec7598ad035d836e2a810f3877a745b24"
],
[
"p",
"a363b731c07ff45cd55025c0311344bac7096d51e475de51074a51434b25908b"
]
],
"content": "In that case. Pick a social circle. Clone the conversation content of all users in the social circle. And then use the imitation domain name to do NIP-05 authentication. Then you can form a fake social network and use it for fraud, right?",
"sig": "c77c38743b83b835c29a2af6abd05613b33bfde07ea1c7ffde53dc8f8c6aae946c167b56115dbad351b69d18c2b89ce06703a0a0b3b399a1581d25272e031029"
}