Event JSON
{
"id": "9ffab8de5a2bc68ffb969dd826057019f142e5048f437ff46564c4253b96e07a",
"pubkey": "4baefa4bea277c64bdcde0e27bf8445c15e54a6924f4952bb32e94a760d93eb3",
"created_at": 1688933829,
"kind": 1,
"tags": [
[
"p",
"e06c1f25be1e23f1c90a88ce823dd8f2a2c167db37cd429ebc5e85c1c8414d0d",
"wss://relay.mostr.pub"
],
[
"p",
"26cad6f140bf86de9c26b7c15419cab1aebdd7086358d26aa2d750e21cf3bf2e",
"wss://relay.mostr.pub"
],
[
"e",
"90a7334e71fef09454d399b49f890f4008b7f6ed6be279111068d39d618e3315",
"wss://relay.mostr.pub",
"reply"
],
[
"mostr",
"https://chaos.social/users/chrysn/statuses/110685967473117683"
]
],
"content": "nostr:npub1upkp7fd7rc3lrjg23r8gy0wc723vze7mxlx5984ut6zurjzpf5xss4tcwy Why just pcap-like? If it was based on pcap, I could open a strace, reassemble a TCP stream from reads on some write socket, and then run wireshark's protocol dissectors on the data exchanged.",
"sig": "232dd155df25fef93408049902b4f5ab8e6b15a497bc60fcbc052564383b10ab01aac8baa03463e132baa7b48a224370ce73760153771539b746c360f7969c4c"
}