Event JSON
{
"id": "8ba95f7827e2dc9bde8cdb422b3d0e8665f4b7a7d9458a1961f098f92097b6d1",
"pubkey": "38d14223f15267ec44a0c40b7d0bc4c037d857168595ab46d5cc117f62290143",
"created_at": 1725044391,
"kind": 1,
"tags": [
[
"p",
"a525dc37a219d2ff4c9f71d3ac8c45945bce8801699121e0f20b37f4d90135b3",
"wss://relay.mostr.pub"
],
[
"p",
"2d0ec6e846d7e34b36179f878ef9f80ffdeeef891a31549b0d46d38de2545ab7",
"wss://relay.mostr.pub"
],
[
"e",
"891bd7a356280677fe92b512c6868a5b0a16b2e524d468ccf9a5c297b1a7ad4b",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://chaos.social/users/vollkorn/statuses/113052509265415706",
"activitypub"
]
],
"content": "nostr:npub155jacdazr8f07nylw8f6erz9j3duazqpdxgjrc8jpvmlfkgpxkesr4gqtt Aber das bringt mich zum Sinnbild, dass Hacker wie das Wasser hinter einem Staudamm sind: Sie brauchen nur einwn Riss irgendwo im Staudamm, um das ganze System zu überfluten, äh, übernehmen.",
"sig": "5aedaa98640bb8c9cff24085d0b5df97d62d5117fe6c1335c56f45950a83e1e9858c57b49561f83179e450fee5d4c48a258626a7665e057431605faff8dc83e6"
}