Event JSON
{
"id": "0528f6d57bedc19ac521fcdcf4f7adbe50420a498255bc80bbbbcd40f028f08f",
"pubkey": "20502883ace25666fa4de12ff6fc01b2a6a654d89e28342ed523c3d262c4a2fc",
"created_at": 1741181167,
"kind": 1,
"tags": [
[
"p",
"b6f005dd68a4ec5cbc810660d43e4a7a892de880fbfe1ba3c365cff7153c8fd6",
"wss://relay.mostr.pub"
],
[
"p",
"a6916537fce200919664daa76370ab995bf5461a3ef2988915dd8f6701ff426f",
"wss://relay.mostr.pub"
],
[
"e",
"c5322b7793bee94fb1dce850d8f947b262e2557e8047e981a76373e8ac99a0ca",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://gultsch.social/users/daniel/statuses/114110048965400116",
"activitypub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqkmcqthtg5nk9e0ypqesdg0j202yjm6yql0lphg7rvh8lw9fu3ltqkvhz4t Unclear. The API is documented¹ and/or not super hard to reverse engineer. I have seen at least one case where I could tell from nginx logs (failed attempts due to incorrect use, followed by correct use from the same IP) that the app was not used. I don’t know how common this 'actual abuse' is compared to 'accidental' things like users having a typo in the phone number or the SMS not being delivered.\n\n¹: https://codeberg.org/iNPUTmice/QuicksyServer/src/branch/master/README.md",
"sig": "4a73cc9ca385a7137a226c6adea928f42acea2222f8db1fabbc19fb9c2ea417d160d89a0cd0bba48489661c209fc6dc1ea00f45a877a2758ba84180af71ca1bf"
}