Event JSON
{
"id": "dea4f0b3ced5ff3eb0cfb50ddaf1325e6e79f4ce54753d933e8377ca0b4871df",
"pubkey": "9532356a0aa52578e742574ab72290179b911e26e100ad043ab1d9e003d037ee",
"created_at": 1742330082,
"kind": 1,
"tags": [
[
"e",
"17f994c1325647386e1872393cec95aaec0bfd89748bd5ee5701bfad19bfd8bc",
"ws://192.168.18.7:7777",
"root"
],
[
"p",
"cedab81be42ef47dbde653f4ba7ab25ac3aa32cfc2b672ee0f89c0faf882f13e",
"",
"mention"
],
[
"p",
"e88a691e98d9987c964521dff60025f60700378a4879180dcbbb4a5027850411",
"",
"mention"
],
[
"p",
"efba4c3bc34558d20ff0a433dd81a0fbce0c3734d7b579d6d020d8629bbdcb79",
"",
"mention"
],
[
"p",
"0371db7fd4437ce63e60dedc313cad6ee8b17fc691fe05231f9a140134fc0d08"
],
[
"r",
"wss://nostr.sagaciousd.com/"
],
[
"r",
"wss://relay.fountain.fm/"
],
[
"r",
"wss://relay.primal.net/"
]
],
"content": "So, what is the realistic attack vector here? Someone has to get nefarious code onto the device that exposes the flaws?\n\nOr, are you saying they can enable BT, get within BT range, then install code (or exploit something native to the chip)? And, then somehow transmit the seed phrase? Or change addresses, or stuff like that?",
"sig": "7dc8e4d690ec5196511a454e4b32f21d77d326b9be68a05a4b10eaad567145b301c376d36a8a11574e67f4ad3967ef21cde890fd64fe3be7e781ab84669c3f05"
}