Event JSON
{
"id": "fd4bc844f3a2535be4b8b19250df907246fa3826551968a5a09720dae7138ad2",
"pubkey": "b3ba3c5045fbaf99be9cb4daa9f1d7baeedaba0fc5b91596511e2fb7a70dd7f9",
"created_at": 1701039410,
"kind": 1,
"tags": [
[
"e",
"ca3b9e858e8b1f96e09246c7c38a4931b0c9f5f6d76c26b324c4a8e36fd53a58",
"",
"reply"
],
[
"p",
"b3ba3c5045fbaf99be9cb4daa9f1d7baeedaba0fc5b91596511e2fb7a70dd7f9"
],
[
"e",
"cc93cca17507cac14c766cb2b8a65e0adb71c0698020931d854bbac5ea4de612",
"",
"root"
],
[
"proxy",
"https://grapheneos.social/@GrapheneOS/111479318824446241",
"web"
],
[
"proxy",
"https://grapheneos.social/users/GrapheneOS/statuses/111479318824446241",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://grapheneos.social/users/GrapheneOS/statuses/111479318824446241",
"pink.momostr"
]
],
"content": "We mentioned Signal/WhatsApp because despite having end-to-end encryption, they both have a massive amount of remote attack surface, use tons of memory unsafe code for handling media, voice/video calls, etc. along with not using sandboxing. E2EE does no good if app is exploited.",
"sig": "bd0e231a0eb83121b7e653b01c32f7f24ad4ff6ff2cc07ba7361f557ac850f613b684edf07352841d8af5549402bb6800885c1050977c017bf0d09e1b3927ab0"
}