Event JSON
{
"id": "304faf4c579e7d138f1abe62e57d070b2a2f2bf2dd5e354468b60c73c97a4258",
"pubkey": "5468bceeb74ce35cb4173dcc9974bddac9e894a74bf3d44f9ca8b7554605c9ed",
"created_at": 1731255940,
"kind": 1,
"tags": [
[
"p",
"9442953111d31065ecd2370d8e5093bd2c31b3f4a036428d2629da7086b8ebb1",
"wss://relay.mostr.pub"
],
[
"p",
"16aac1b9531756dcf30d7a2c95ec847329f75cac17cf8fc9fae868834d3f7d61",
"wss://relay.mostr.pub"
],
[
"p",
"e049552fbf137d5d305d1229c208876f0a0a686de5a442b25f5afed2eaa600a4",
"wss://relay.mostr.pub"
],
[
"e",
"21bffda9f0b82464acf5917dec0150164c6ee628e2f1acf0368c525e6b6fcd9f",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://grapheneos.social/users/GrapheneOS/statuses/113459589313327369",
"activitypub"
]
],
"content": "nostr:npub1j3pf2vg36vgxtmxjxuxcu5ynh5krrvl55qmy9rfx98d8pp4cawcsvzm7q2 nostr:npub1z64vrw2nzatdeucd0gkftmyywv5lwh9vzl8clj06ap5gxnfl04ssnrsxul It needs multiple privileged permissions. Suggest looking at how it's integrated as a privileged component in /e/OS and CalyxOS. DivestOS takes another approach and integrates it with only the signature spoofing as you're describing, at the cost of losing functionality including likely losing reliable FCM push support. Look in the microG repository at the declared privileged permissions.\n\nAlso, in what way does it avoid using Google Play code in general when the apps have it?",
"sig": "e6ff024bffe9dc58899b6dbbdf3a2b924b70d5292146f77b5ecac13cc2b68f7ea1b7baa31af7e61ac87c7afaccb08fb8ba7fb1563879e36123f9ae448448fd4f"
}