Event JSON
{
"id": "dcfee4d6b8a53638bd560b160a57fa2f52d0c37de42ef77ad52f1fbfa56fcac8",
"pubkey": "d819d9a0e84a33b83d61657a25c1012d5f86d4edd11ffd6c04a0f5a0f10e7033",
"created_at": 1703858725,
"kind": 1,
"tags": [
[
"p",
"34b3698a506e008abff3157d8dc41b085318d81a54880bd4320af81482511268",
"wss://relay.mostr.pub"
],
[
"p",
"72815f88b313be1240b000765f1ee5a5f1859f54f8ac7589bdd8a5e4cbb60629",
"wss://relay.mostr.pub"
],
[
"e",
"b7fb09fe5daa285b73e3eee3a77cfce7c21b409ca7050867c79128fd7437a068",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://noagendasocial.com/users/Wy7usa/statuses/111664085452981940",
"activitypub"
]
],
"content": "nostr:npub1xjeknzjsdcqg40lnz47cm3qmppf33kq62jyqh4pjptupfqj3zf5qlc85rf \n\nThis line alone shows that the author has not clue what he is talking about.\n\n\"\"\"Chinese intelligence officials have covertly used commercially available service providers in various countries in the past, often as backup communication networks, according to multiple former U.S. officials. They frequently seek out encrypted networks or ones with strong security protocols so they can communicate securely, the officials said.\"\"\"",
"sig": "767b8fd0af6f9cbbf23d53c4395edf92f564a51db2e26c3158a53b57fd9056881f846ffb14eb2c5aa4dd2cc6d58677f4a222339442f654715f4a071a734d5dc0"
}