Event JSON
{
"id": "181b5071d8f749db3305f8bd81c6037d33edd831cc34982d675e5023fd82473b",
"pubkey": "abbc753fd9fc0ec851266f2f7677ef19448e482955af80113cbeecb52fe46608",
"created_at": 1741643828,
"kind": 1,
"tags": [
[
"p",
"afb548d6aae363938a3f3e0a2e08bba54e163f66c393351db52a5b6690063c1a",
"wss://relay.mostr.pub"
],
[
"p",
"5ee6c59afabffe2719ca97e72705b5a1d1e4f7d22dc457349f0cf9625ad5af8d",
"wss://relay.mostr.pub"
],
[
"e",
"cca6a25a985ef56a629d5cf9d7c5bfbd7b1142b5bc3ae4ac510128a3fef90dec",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://vt.social/users/lina/statuses/114140369954745316",
"activitypub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpq47653442ud3e8z3l8c9zuz9m548pv0mxcwfn28d49fdkdyqx8sdqlmdexn It's possible to use HCI via firmware API (see `esp_vhci_host_send_packet()`), though there are probably very few applications that do this. Most would use direct and higher level Bluetooth APIs.\n\nAt the end of the day, the number of actual devices/applications where the undocumented commands have an actual security impact is probably close to zero...",
"sig": "0494d423c9c2cdf4a7bffb5451eecf99b33d4f4d8ffb77e3d635dfec2726e55418bd0c86e9393e27ad5e201cb03c277bf497fb3a0fb26c5555eb7a93fc0f1c91"
}