Event JSON
{
"id": "d897b364403aba79c2030ebdcbf4d7e0f96ef5503066e5793edae944069477d7",
"pubkey": "516ac7811d9cee7e7349da83712faa5f1cd99a2302fe8d7cf81702f3dc0cf4c5",
"created_at": 1731489781,
"kind": 1,
"tags": [
[
"t",
"redhotcyber"
],
[
"t",
"hacking"
],
[
"t",
"cti"
],
[
"t",
"ai"
],
[
"t",
"online"
],
[
"t",
"it"
],
[
"t",
"cybercrime"
],
[
"t",
"cybersecurity"
],
[
"t",
"technology"
],
[
"t",
"news"
],
[
"t",
"cyberthreatintelligence"
],
[
"t",
"innovation"
],
[
"t",
"privacy"
],
[
"t",
"engineering"
],
[
"t",
"intelligence"
],
[
"t",
"intelligenzaartificiale"
],
[
"t",
"informationsecurity"
],
[
"t",
"ethicalhacking"
],
[
"t",
"dataprotection"
],
[
"t",
"CyberSecurityAwareness"
],
[
"t",
"cybersecuritytraining"
],
[
"t",
"CyberSecurityNews"
],
[
"t",
"infosecurity"
],
[
"proxy",
"https://mastodon.bida.im/users/redhotcyber/statuses/113474914313586036",
"activitypub"
]
],
"content": "Ti Sentono, Ti Vedono, Ti Tracciano! Come i Servizi Segreti Accedono ai Dati delle App senza Mandato\n\nhttps://www.redhotcyber.com/post/ti-sentono-ti-vedono-ti-tracciano-come-i-servizi-segreti-accedono-ai-dati-delle-app-senza-mandato/\n\n#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy #engineering #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity",
"sig": "63bddba5b99244a9f5f0cd5aeb8d2ea839a0f8deb06611c9dd635b0fcae001eb31047dd95ca0ee688ecccd30f3a1e11f9e6b48702590092b1cca138b8d41c119"
}