Event JSON
{
"id": "9c2fb0c0ea3d23f2ea58eb81e8418fbe059775887202f0000468f91b79af3564",
"pubkey": "5468bceeb74ce35cb4173dcc9974bddac9e894a74bf3d44f9ca8b7554605c9ed",
"created_at": 1749756960,
"kind": 1,
"tags": [
[
"p",
"904ab564c808c3010eaeaf55a0a27dd0bf827acb92d57458a37584d74a8defde",
"wss://relay.mostr.pub"
],
[
"p",
"c57c20e72f72ea81da5ecf66ac531bcfb34a1107f7893b2456f5e1f5c0a627b8",
"wss://relay.mostr.pub"
],
[
"e",
"76cb019f515d689c85fe38b1f1d209a72f0bb045ba2a4cf6f546438f3858aa02",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://grapheneos.social/users/GrapheneOS/statuses/114672072135737495",
"activitypub"
],
[
"client",
"Mostr",
"31990:6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9:mostr",
"wss://relay.mostr.pub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqjp9t2exgprpszr4w4a26pgna6zlcy7ktjt2hgk9rwkzdwj5dal0q62ggmd We've quite successfully blocked real world exploits by forensic data extraction companies which are primarily based on Linux kernel exploits. That's primarily done through the generic memory corruption exploit mitigations we've added/improved and especially our USB-C port control feature. Our earlier software USB accessory blocking while locked worked well against them but the newer hardware-based feature we made is much better. However, there's no way to do this with apps.",
"sig": "674be19b7b27b2a5a9b9951c61ab9aec636362f6708011ef056f8f0b8a76d207d0579c6eb6c5c027c490f86828aef529b8238ad24e425e252479920275a3bed9"
}