Event JSON
{
"id": "16cda1b9c6e0b9786932799a242ebbb8d1dfe9b46781357fa9cbaca83f823598",
"pubkey": "b90c3cb71d66343e01104d5c9adf7db05d36653b17601ff9b2eebaa81be67823",
"created_at": 1742892916,
"kind": 1,
"tags": [
[
"e",
"386011cb214ea42d4bc4c9eaa0c45f491a9c85a34cba6ce515d7bd47070dd21d",
"wss://nostr.oxtr.dev",
"root",
"50d94fc2d8580c682b071a542f8b1e31a200b0508bab95a33bef0855df281d63"
],
[
"e",
"2b5f49a5841d6eff2d3ce9a502975e92028a2691051bf48cfc35eb960be97eb4",
"wss://relay.primal.net/",
"reply",
"ac42bb048c33791a4d7c770a460eed170fe8f283e569c8b273304d382751bfff"
],
[
"p",
"50d94fc2d8580c682b071a542f8b1e31a200b0508bab95a33bef0855df281d63"
],
[
"p",
"ac42bb048c33791a4d7c770a460eed170fe8f283e569c8b273304d382751bfff"
]
],
"content": "Yeah of course \n\nhttps://www.bankinfosecurity.com/criminals-remotely-ghost-tap-nfc-for-card-cash-out-attacks-a-26860",
"sig": "35ede3298844308d88519f44efd24850d784eae7b7875ace93af0c0532ab52cbddc4a5b637db64329261e8ea56d455b184828d21afbddcaa837bbdc54dd067e8"
}