Event JSON
{
"id": "56fd983b89094123bfec9d71c1622990d0741accf18d203d2ac20d43fe5b78c9",
"pubkey": "acde3ea95be08c0da72a5b0645c865fb2a08b99d7b06e4801fe5d1135f9b6b1c",
"created_at": 1694190980,
"kind": 1,
"tags": [
[
"p",
"663e5b600e742d48e847856fab54e01a6dbf6fb710ed4d89ec7d645ad1fe6a9f",
"wss://relay.mostr.pub"
],
[
"p",
"4afb3830f7c5db05d5934438779f63c3ed1401aa03a2eb0cc3cda743633aea61",
"wss://relay.mostr.pub"
],
[
"e",
"db031b2f5483c85e5891c91f0043f908d6153b15203e5eaa79d2331766dfd216",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://swecyb.com/users/nopatience/statuses/111030500067098480",
"activitypub"
]
],
"content": "nostr:npub1vcl9kcqwwsk536z8s4h6k48qrfkm7mahzrk5mz0v04j94507d20s6hk6t3\nMy thinking was, and it may very well be flawed, that TAs finding and exploiting unknown vulnerabilities like in this instance was, perhaps not novel, but still not entirely common?\n\nSure, announced vulnerabilities have been exploited for a good while especially when PoCs have been released. Then TAs have been pretty quick to take advantage.\n\nBut again, I may be completely wrong here ans it really is business as usual. :)",
"sig": "eacda1c238f9d27cede9d9e59cd3109c7dd0a5864a72d594cf5e9c36c7fcf3e20562be357fca039fe483adf18fe7ebcf0df9e37fab567e64185f74051d96fb7a"
}