Event JSON
{
"id": "8bc773cd2896cb9f502766e8c26cf7c9f34755b7f4c3d31c9f9538856daf64bc",
"pubkey": "2d8311764b617f1cfa74bb6c271d9e91785f45d5cc8d172b2eec6c0105ac1285",
"created_at": 1715685710,
"kind": 1,
"tags": [
[
"p",
"415e56c503afd824b1877d84febd68788b8b1f71e9671728bcb378fcd59dc952"
],
[
"p",
"82d66bea6d1e04d5219b3d402d54aa444c5a5e24bd442e1c949de4adba75cfb2"
],
[
"e",
"545d6d0d5490d1cefd6550f82e997f6dc26b014a20c94a93febfe5d030a9d846",
"",
"reply"
],
[
"proxy",
"https://gruene.social/@weddige/112439178694425404",
"web"
],
[
"e",
"f108490e1051234a6e5945f0cc03f9abda55d1a82cb4b4e15b495beb423efd24",
"",
"root"
],
[
"proxy",
"https://gruene.social/users/weddige/statuses/112439178694425404",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://gruene.social/users/weddige/statuses/112439178694425404",
"pink.momostr"
]
],
"content": "While I agree that it's good to expect compromise of whatever technology you're using, I don't think this take is really helpful.\n\nThe assumption that everything is compromised, apart from discussing strategies for dealing with it, just takes away our ability to make informed decisions. We have limited knowledge of the capabilities of the relevant threat actors, so we have to weight the probability that a particular implementation is still secure.",
"sig": "cad39296d252724acabcf81b02511f82e1e3997f954e1d2a4cfe98bad1a8f2fff3b248ea7d6e73b609bcbc307552ae9f6d452422caa76b1abb6b7f04d1530bfb"
}