Event JSON
{
"id": "51c8dfcf772d525396f231b391cc43bd5f7e41d2fc11da541b60d0ee1e3b180a",
"pubkey": "f5759699c92ae2addf1eac17701485903a7344f16e19fd77a2e374e4043969bd",
"created_at": 1726414886,
"kind": 1,
"tags": [
[
"zap",
"f5759699c92ae2addf1eac17701485903a7344f16e19fd77a2e374e4043969bd",
"wss://relay.mostr.pub",
"0.915"
],
[
"zap",
"6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9",
"wss://relay.mostr.pub",
"0.085"
],
[
"t",
"apple"
],
[
"t",
"visionpro"
],
[
"emoji",
"apple_inc",
"https://cdn.fosstodon.org/custom_emojis/images/000/079/582/original/9196281b0343b68b.png"
],
[
"proxy",
"https://fosstodon.org/users/governa/statuses/113142326029701863",
"activitypub"
]
],
"content": "#Apple #VisionPro Vulnerability Exposed Virtual Keyboard Inputs to Attackers :apple_inc: \n\nhttps://thehackernews.com/2024/09/apple-vision-pro-vulnerability-exposed.html",
"sig": "44d4a77321d13e51a024460b42552fa894e499e559accf9d3e517383a53ff6c7abc633fd4fe1e7d0b81cdf021f219bd9f3d2707c8876398e79ec1819f867e467"
}