Event JSON
{
"id": "9853ad103c1fdc2dc1be7da7af296d83e6d160a6645d640ec14dff6c492a8ec1",
"pubkey": "27558eefc58f86655449ce8ce8486cb38bbb4ea5e1a8853d08a8c4f9093cd726",
"created_at": 1736370049,
"kind": 1,
"tags": [
[
"p",
"ded1bd4807959978869bc19e4f782c475df2aeffdbfcb45a42b4800946fc2549"
],
[
"p",
"9da283eb0dabd2fa25336d9cd35c3f0d15a0ea7c648d18d5f871a7b129d8b034"
],
[
"proxy",
"https://chaosfem.tw/@Athena/113794747553425710",
"web"
],
[
"e",
"0bb495f01200acd7d3067150b34fa0d9bd586329b19e466f4c3d17ebe07255dd",
"",
"root",
"ded1bd4807959978869bc19e4f782c475df2aeffdbfcb45a42b4800946fc2549"
],
[
"proxy",
"https://chaosfem.tw/users/Athena/statuses/113794747553425710",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://chaosfem.tw/users/Athena/statuses/113794747553425710",
"pink.momostr"
],
[
"-"
]
],
"content": "Are packet radio worms allowed by FCC rules?\n\nLike as long as the transmitting station properly identifies and does not obfuscate the purpose of the message, and arguably publicly documents the message, I don’t see anything in Part 97 prohibiting it. Nothing really addresses the possibility of an unauthorized takeover of an automatically or remotely controlled station; arguably 97.219(c) and (d) indicate that responsibility for transmissions would remain with the control operator of the station regardless. \n\nThis question is entirely academic, to be clear; as cool as I think the idea is I definitely don’t have the time to write a worm right now lol\nnostr:npub1nk3g86cd40f05ffndkwdxhplp526p6nuvjx3340cwxnmz2wckq6q3pd3qm",
"sig": "7780d2832489c7bdf6d49843cc4c7f4fff3b60d6b75f51f5fadc791fa8cdc10b4565be422721573566c665ef571f81315450dbbce560993d01768f19e71e6ac1"
}