Event JSON
{
"id": "5b667b69b24283052714a5683ee1d32186bf080c835a5f8cef9a20c7f424faa4",
"pubkey": "8a28829612eacac07efc2ec93197c2cb3f8c01bac1a9f37504600f086dae8f75",
"created_at": 1698087139,
"kind": 1,
"tags": [
[
"e",
"26b85bff692565d0254ce092f5cacb2718041f046c94a00bd8aacc432c4ec773",
"wss://relay.mostr.pub",
"reply"
],
[
"t",
"superfish"
],
[
"t",
"https"
],
[
"t",
"tls"
],
[
"t",
"encryption"
],
[
"t",
"crypto"
],
[
"t",
"privacy"
],
[
"t",
"email"
],
[
"t",
"security"
],
[
"t",
"infosec"
],
[
"t",
"cybersecurity"
],
[
"proxy",
"https://fosstodon.org/users/RTP/statuses/111285838756891488",
"activitypub"
]
],
"content": "🗞️ RELATED 🔓: Root Certificate Abuse \u0026 STORY: Detecting Abuse w/connections to defense industry / HTTPS / False Encrypted Email Here\n\nIncluding Relation To BIOS Backdoor #Superfish:\n\n#https #TLS #encryption #crypto #privacy #email #security #infosec #cybersecurity \n\nTOR FRIENDLY LINK: https://web.archive.org/web/20230315031312/https://www.buymeacoffee.com/politictech/security-root-certificates-how-to-detect-abuse\n\nCLEARNET / I2P OUTPROXY: https://bmc.link/politictech/security-root-certificates-how-to-detect-abuse",
"sig": "72db3b3ada0836432b548687dc3d8242cef67c0674483feeff047923aa1e4729f05212deda05417dbf65184d7e34090a5be8df420a1da0bb89922cf191243680"
}