Event JSON
{
"id": "33b79590cb54e239e55b1fe4f6ba6251d03aac564ce4345700fe07fbc01df0c0",
"pubkey": "3c65f4528f1db02ae90cd1ce3c494daf425c18dc5d3e854fb9bf73a55fe3fcd3",
"created_at": 1737136412,
"kind": 1,
"tags": [
[
"p",
"5e806bc2640e48ed184da77091df95a4652917f33d13d2aa7f52529dbe076cee",
"wss://relay.mostr.pub"
],
[
"p",
"20f7ba8bfa108c561b8f9d55e229378ffaf9e6704e26aa5d359317149aa06a5d",
"wss://relay.mostr.pub"
],
[
"proxy",
"https://infosec.exchange/users/hdm/statuses/113844971949506380",
"activitypub"
]
],
"content": "The nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqt6qxhsnypeyw6xzd5acfrhu453jjj9ln85fa92nl2fffm0s8dnhqe8f0q0 project added the leaked and decrypted keys from the Fortinet breach: \"Overall, there were around 100,000 private keys in PKCS format and 60,000 in OpenSSH format\" https://blog.hboeck.de/archives/908-Private-Keys-in-the-Fortigate-Leak.html",
"sig": "b8db21fc4680ecfb10e29a605c85607a09eb745edf64d1878d51a9fcd0bf5b78abae795f082a08b4c94472b241de173da03714ab763136365cf737e1158a06c9"
}