Event JSON
{
"id": "58992a13cd651a975055554a762a790e849bc37e96ae4ab142bb092f44b330de",
"pubkey": "f55f2943e4883528bebc6555a32b94622552719ef9a67854fb2c2f7b2cca6a32",
"created_at": 1680615641,
"kind": 1,
"tags": [
[
"p",
"51924fff4a933b2fbe86452e6333fe6cd905647ef7a7fa7c2993154d1b9b8da5",
"wss://relay.mostr.pub"
],
[
"p",
"cff9b45b9184a1726556f0cce8e878b9db4da63c0ea2d295557f8997c7e87b79",
"wss://relay.mostr.pub"
],
[
"e",
"22604a5751ec6b1eceb371e4881186547e5cb656309bf95d40742718f9c4d03b",
"wss://relay.mostr.pub",
"reply"
],
[
"mostr",
"https://liberdon.com/users/saahbs/statuses/110140826695670921"
]
],
"content": "#[0] since the attackers had enough control of the efile server to add a js malicious code, this means they had enough control to serve the same maleware without js. The mechanism for exposing visitors to maleware was bad agent gaining access to the server and not js itself.",
"sig": "867dac08f82fd3f0362347ed07880dc773fcdb1e4ee57e8ddec1827617b25db13592abe9608feab778098cbdcba80641e73c7e4b4c8e6965d2d7ec3cdc3f80c9"
}