Event JSON
{
"id": "34fde8e31df4de079ed20aac6c0484c64d6ef99060fee36e108b55c9abccd917",
"pubkey": "6fae3efabeed99627753383aee38a220ac354c588f12f54640d834eb9f7d11ec",
"created_at": 1715742813,
"kind": 1,
"tags": [
[
"e",
"fc90fb3a806715d9c3dd7c548f59d21ee59a6c69097b70f9bcc6e4f7080472bf",
"",
"root"
],
[
"e",
"2cdb84df137662832112dd9eac153deed096e9aadbf25a5bf0bfb392d44fc02a",
"",
"reply"
],
[
"p",
"58c741aa630c2da35a56a77c1d05381908bd10504fdd2d8b43f725efa6d23196",
"",
"mention"
],
[
"p",
"d8a2c33f2e2ff3a9d4ff2a5593f3d5a59e9167fa5ded063d0e49891776611e0c"
],
[
"p",
"6fae3efabeed99627753383aee38a220ac354c588f12f54640d834eb9f7d11ec"
]
],
"content": "Identifying and doxing threat actors seems more effective imo\n\nhttps://www.wired.com/story/p4x-north-korea-internet-hacker-identity-reveal/",
"sig": "a225479fa14d63bd7e94ad4275e9ae533fc72dd20d621f3c89debb2bbaba7c9129c5c2bda8d4677ec5ef84ecf37b6e8b173738b3a88bd700bf2df0a9ce493315"
}