Event JSON
{
"id": "3110a098323cc949fe24ee37d8011efdf38f1fbed4352b6553b77ce6b596adb5",
"pubkey": "742fd4b00ed3d1c2d33d49e2eb36ef627a882adc126eb09df80d48cfe5f0c0d2",
"created_at": 1736617391,
"kind": 1,
"tags": [
[
"t",
"hacking"
],
[
"t",
"hacker"
],
[
"t",
"history"
],
[
"imeta",
"url https://assets.chaos.social/media_attachments/files/113/810/943/217/258/404/original/56e4f52d78cf589b.png",
"m image/png",
"dim 557x707",
"blurhash UHMaR]~qRjIUxuof%MIU~qM{xuWB9F%Mxuay"
],
[
"imeta",
"url https://assets.chaos.social/media_attachments/files/113/810/943/511/686/657/original/3e61dc3ac67982cd.png",
"m image/png",
"dim 572x738",
"blurhash UDNKFy-;D%j[t7ofazRj~qD%xuRj-;M{offQ"
],
[
"proxy",
"https://chaos.social/users/realhackhistory/statuses/113810957389304464",
"activitypub"
]
],
"content": "I'm working on a few blogs and a video right now but in the mean time check out this amazing illustration from an article on computer crime that appeared in the The Pittsburgh Press on the 4th of October, 1983. It looks like it could be straight out of an 80s cyberpunk RPG sourcebook. The article itself discusses the theft and sale of physical computer hardware.\n#hacking #hacker #history\n\nhttps://assets.chaos.social/media_attachments/files/113/810/943/217/258/404/original/56e4f52d78cf589b.png\nhttps://assets.chaos.social/media_attachments/files/113/810/943/511/686/657/original/3e61dc3ac67982cd.png",
"sig": "cce28172adc884e92bc59ef2ddd0b32c691b0be8859252dd46fe7b1a6dc338c985b8b5634732ade28f28a88def07bb23d775573cb210276f3acde472d536838c"
}