Event JSON
{
"id": "a76dc25d3a8c91ea7debc3b9fded2e8d93affc813bffc797f6ed43e64f4c62cd",
"pubkey": "95d2f9c90dab8c440cdd1e8fe20a37f0c9fe08b181da6e02a61fda04370f8fcd",
"created_at": 1702668239,
"kind": 1,
"tags": [
[
"p",
"95d2f9c90dab8c440cdd1e8fe20a37f0c9fe08b181da6e02a61fda04370f8fcd"
],
[
"e",
"624374c450db147a10277c3b1b6fdf12ef4abcaca7e9048d3a4821aa77d36bca",
"",
"root"
],
[
"t",
"tor"
],
[
"t",
"namecoin"
],
[
"t",
"ietf"
],
[
"t",
"i2p"
],
[
"t",
"gnu"
],
[
"proxy",
"https://aoir.social/users/rwg/statuses/111586065715433666",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://aoir.social/users/rwg/statuses/111586065715433666",
"pink.momostr"
]
],
"content": "So, back in 2015, there were multiple groups creating encrypted, anonymizing networks (many of which are still in operation today): #I2P, #Tor, #GNU, #Namecoin.\n\nThey went to the #IETF to standardize how browsers would handle their special top-level domains.\n\n(I warned you this was nerdy).\n\nThe idea here was that if a user typed domain.i2p or domain.onion into a browser, the browser would leak that request to search engines or DNS servers.\n\n2/🧵",
"sig": "eaa82792e8be7752f0d140f4ce059e088de76cc04741e2357cea212440682e7d4652e446d0b219736663cdb8dd03c158ea91925d68ac53940414f3b02665d404"
}