Event JSON
{
"id": "59b96e03091350a9b60ae2f1092c33e5887768ae1029f22ff6294f0de92fc7cf",
"pubkey": "fea186c2a4678dbc437704eed2160846e8a781e5fb17056e9bb333840d5bdef2",
"created_at": 1741978987,
"kind": 1,
"tags": [
[
"e",
"98de9a61b965b40d8abd9cebda72af8d12f5e60ab1a6945be6cde497465b7904",
"",
"mention"
],
[
"p",
"3f770d65d3a764a9c5cb503ae123e62ec7598ad035d836e2a810f3877a745b24",
"",
"mention"
],
[
"q",
"98de9a61b965b40d8abd9cebda72af8d12f5e60ab1a6945be6cde497465b7904"
],
[
"zap",
"3f770d65d3a764a9c5cb503ae123e62ec7598ad035d836e2a810f3877a745b24",
"wss://nostr.wine/",
"0.9"
],
[
"zap",
"fea186c2a4678dbc437704eed2160846e8a781e5fb17056e9bb333840d5bdef2",
"ws://127.0.0.1:4869/",
"0.1"
]
],
"content": "I have a general rule that I don't click critical links in emails.\n\nFor example, I get an email from my bank saying it's time to reset my password using the following link. Awesome. Usually legit. I could fuck around with confirming it. But that's a waste of time. Instead, I either type the known correct home page URL in my browser, or open it from Bitwarden if I'm unsure (.com, .org, etc can be abused if the institution was dumb enough to not buy them all). I then find the password reset option after logging in on the known correct website.\nnostr:nevent1qqsf3h56vxuktdqd327ee676w2hc6yh4uc9trf55t0nvmeyhgedhjpqppemhxue69uhkummn9ekx7mp0qgsr7acdvhf6we9fch94qwhpy0nza36e3tgrtkpku25ppuu80f69kfqrqsqqqqqpx0agpk",
"sig": "31d03ea6067f6225c1aace43c3a585812edf7438d682400e9a426517f95b7150e50b8d52afdbf23980ade26ab66342ae80e36db8db1f689550ab05c7b31ad0bc"
}