Event JSON
{
"id": "807ad8d2e9af7fc39b04e972077a68f105f2a34b6d5c602df49516789fdfc82e",
"pubkey": "582a41c6eca3d12c80acd248a7c8f3070c83c859b9ac1739cbecc074cf09a747",
"created_at": 1715800195,
"kind": 1,
"tags": [
[
"p",
"582a41c6eca3d12c80acd248a7c8f3070c83c859b9ac1739cbecc074cf09a747"
],
[
"p",
"c386eba671069730be39dd286d3d629921619e51772ff94a41cb5f88a54b4f13"
],
[
"e",
"8fe85b3dad5a59b70040f07a3c3f3da3bd46a4cebc3fa2be3bd9843169f5e665",
"",
"root"
],
[
"proxy",
"https://mastodon.social/@mcc/112446681593094687",
"web"
],
[
"p",
"47da2cf03fcd20815d53b324e2986b5f00da9046343e07cffad5980e54641450"
],
[
"e",
"151e2baf456c841e4118cd6669fc52b381a6657603c9f097a0b818af5896cd08",
"",
"reply"
],
[
"proxy",
"https://mastodon.social/users/mcc/statuses/112446681593094687",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://mastodon.social/users/mcc/statuses/112446681593094687",
"pink.momostr"
]
],
"content": "DEEPLY CURSED TWIST ENDING: What it turned out was happening here is that this was all being run in a copy of \"fish\" (the shell) that was, at some point immediately after this laptop was purchased, installed as an x86_64 executable. On ARM mac, x86_64 executables report they're on a x86_64 machine, and when they invoke fat executables they'll preferentially invoke the x86_64 slice. So x64 \"fish\" invoked an x64 profile lldb, which then freaked out trying to attach to the arm64 `dotnet` executable",
"sig": "65889e4d5f14fefc1316617c89e0eb48a47556af54a69e625427ee852ba107afdcccab14ecf84b6067dc6f4583c1cbc3ab00050b28a5b987844e0ef8f2ec5e4d"
}