Event JSON
{
"id": "89fa3dca460fe9af4b5cb42705e8612b867ecee93e60980fff0869bb7fdb0944",
"pubkey": "110c41b4a3cda67f77e0b4e3b3d8cbca7451cf7850eba9760d1c3a77cca6bc58",
"created_at": 1703544828,
"kind": 1,
"tags": [
[
"p",
"f1c6c5c3fb8809601f84a753072faa00a81b17ab91a190dd7531fed6b6100eac",
"wss://relay.mostr.pub"
],
[
"p",
"6f9089e5e6810f9514a501f04b94466f7473f4db7fb0e9e389966dc7cfb76251",
"wss://relay.mostr.pub"
],
[
"e",
"4e5646c3a7064f0e6b39cc370c9e8627f64c2fed683b84e76713f6a1e15f5905",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/sophieschmieg/statuses/111643513902964545",
"activitypub"
]
],
"content": "nostr:npub178rvtslm3qykq8uy5afswta2qz5pk9atjxsepht4x8ldddssp6kq4sqekt with that scheme, using bigrams identified by the difference of the two numbers should work fairly well for a statistical attack. The difference is invariant under the Caesar shift, so you can work with all ciphertext fragments, and bigrams should have enough of a footprint that they can still be recognized even without this information loss.\n\nI'd test it, but transcribing all these numbers sounds like a pain.",
"sig": "7cd6370d06149fc1ed7f0e36b34e480cadb5fa6c21b27a7f80cb9000db8e5e85279e9ce3282936823ab0dd824e2e433c1ec6e513c8ab1f38c5457b5961227439"
}