Event JSON
{
"id": "86926c150ec227c9f32c353cab5e890c6f66868dca96ff27b5ce1c1ab08d2b53",
"pubkey": "38cf94c0316947e2b2aabf1df24a0b10e242aa0528889e0d40571730048280f0",
"created_at": 1694118685,
"kind": 1,
"tags": [
[
"p",
"beb4ab43e68c2b9a91f3217d09f6123b5fb5289f6a8cbd0e671482491e62aa7c",
"wss://relay.mostr.pub"
],
[
"p",
"48484737f8444aea04613fc9f77b5249e005e3e398474551ba7491b81dd5cf64",
"wss://relay.mostr.pub"
],
[
"t",
"apple"
],
[
"t",
"pegasus"
],
[
"t",
"spyware"
],
[
"t",
"cybersecurity"
],
[
"proxy",
"https://mastodon.social/users/jsrailton/statuses/111025762167826706",
"activitypub"
]
],
"content": "🚨 Update your #apple\n products immediately!\n\nLast week we nostr:npub1h662kslx3s4e4y0ny97snasj8d0m22yld2xt6rn8zjpyj8nz4f7q8e0ec3 discovered a new #Pegasus zero-click exploit chain.\n\n(No clicking required to infect latest iOS with #spyware \n\nFound while checking civil society.\n\nDisclosed to Apple which rushed a patch.\n\nTakeway? Yet again scrappy civil society = the #cybersecurity early warning system for billions of users.\n\nhttps://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/\n\nhttps://files.mastodon.social/media_attachments/files/111/025/753/261/117/544/original/5491fc7efa61630d.png",
"sig": "b464f113a269e5e2c80e98415f2a28a93748f9ed4b4dd2c3ccd409c95a4d8583125789077f6a05cc4bf46dc2c2338921b4ad6d09c92b2fe00641d7bd9fb5f434"
}