Event JSON
{
"id": "18a470ee1ca1703b24cbecfdd8dd456bdcdf02128fb0090ee8768a318ab954a7",
"pubkey": "44393ff8ca21edda8e7e510a2d8aef91e6b71ff38969a69b356215bfb42bac19",
"created_at": 1715012159,
"kind": 1,
"tags": [
[
"p",
"b3ba3c5045fbaf99be9cb4daa9f1d7baeedaba0fc5b91596511e2fb7a70dd7f9"
],
[
"e",
"cc93cca17507cac14c766cb2b8a65e0adb71c0698020931d854bbac5ea4de612",
"",
"root"
],
[
"e",
"fd4bc844f3a2535be4b8b19250df907246fa3826551968a5a09720dae7138ad2",
"",
"reply"
],
[
"proxy",
"https://mastodon.social/@simplex/112395036878295029",
"web"
],
[
"proxy",
"https://mastodon.social/users/simplex/statuses/112395036878295029",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://mastodon.social/users/simplex/statuses/112395036878295029",
"pink.momostr"
]
],
"content": "\u003e E2EE does no good if app is exploited. \n\nI think this is a very wide and generally misleading statement. It's not that black and white. You are talking about different attack vectors, and the purpose of E2EE is to protect from the operator, and the attacks you describe are from untrusted/malicious contacts. Also, the attack via media that would lead to the compromise of E2EE with other contacts is very hard - it's on you to demonstrate it, before stating it's possible.",
"sig": "72f4805f0f218160faee79376e7c30f30320875792317698c0e46021299f11b2f0b330996638712bc36a76274f818bb728dc8350c44efd05a4fb6238f213bf4b"
}