Event JSON
{
"id": "915c9afbd4a0c3dbc1eb6a77230beb52b6c66f6fba76afe44f373efe84ee2577",
"pubkey": "bd8b4da7cc98700dc2b55e029482053003e4eae4a0eb629e2249749b74199624",
"created_at": 1658994496,
"kind": 1,
"tags": [
[
"p",
"bd8b4da7cc98700dc2b55e029482053003e4eae4a0eb629e2249749b74199624"
],
[
"e",
"ea146c8cd2ca08ce5fd8cb2d63715dd2c9f17144c56c9ce6c97fc44ec153688b",
"",
"reply"
],
[
"e",
"75bde1c49eb96a3a51f0398215d76191d9096f63f601ff7f0493d887f407e80b",
"",
"root"
],
[
"proxy",
"https://merveilles.town/@zens/108723863320097527",
"web"
],
[
"proxy",
"https://merveilles.town/users/zens/statuses/108723863320097527",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://merveilles.town/users/zens/statuses/108723863320097527",
"pink.momostr"
],
[
"-"
]
],
"content": "- the user database will never be hacked or leaked\n\nthis one is interesting from the perspective of: if you start from the assumption your user database definitely will be leaked: what design decisions do you make differently",
"sig": "6076294df82b0da1d76a017964efb9e0361b89edbe86a2200477ea3ab29c1ba1f20d4ef0febda0bddcba8e88e7ef48eb4a818401e6391cdc8f6d4c7254173795"
}