Event JSON
{
"id": "f78098c8f699bd2ccbb9b963acd82429578e3b95b42463cb80e531cedde03236",
"pubkey": "80587d28411159709b21896a70ef8583c7886c791d909d862754b5f27e231f8d",
"created_at": 1705083809,
"kind": 1,
"tags": [
[
"p",
"5e61d0925bebeea167f3fae0a276f7ccd29f920a245ed9f4aff568a060e064f7",
"wss://relay.mostr.pub"
],
[
"p",
"1e4e291b424936f1e673f8c9d92c5f6f862a7b53b4f3a1f4e1ebf74655444390",
"wss://relay.mostr.pub"
],
[
"e",
"37f2b17ffd471552e014d43e865bca18cd003761a686d20f5db509829e8cb3bb",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://mastodon.kylerank.in/users/kyle/statuses/111744372549651093",
"activitypub"
]
],
"content": "nostr:npub1tesapyjma0h2zelnlts2yahhenfflys2y30dna907452qc8qvnmsfc5hzz In this case it wasn't Framework directly from what I read, but an accounting partner that (by virtue their work) had to have a copy of customer data.\n\nA determined attacker will ultimately be successful at just about any org, regardless of training, at getting someone to click a link, open an attachment, etc. especially if doing those things is already core to their job. What is important is how companies respond to/stop a successful phishing attack.",
"sig": "de4544b45afdf5f9d1ea5c49199e619d3dffc940e421ce3248953fac52e7af7f173ccc6c926dca5de87d2ba67b0ae132721a707f1a16df9ab090487d4b0aa5ec"
}