Event JSON
{
"id": "b578f64044a1373b8213477fc3ac4ba8a13b6e01a9ee7f1444009c403bec885b",
"pubkey": "b4713daf7ec8bbd39a9c4ded0ea58fa426fa1fb85a4125e83c70eba7ee6e1658",
"created_at": 1725120882,
"kind": 1,
"tags": [
[
"e",
"02df6b2d30fac0a465ae89ebd86fbe1d4b12898b7d21bc001a35d9ced775e331",
"",
"mention"
],
[
"p",
"d7094945513d0072aa9e2d300c65fba336be751ef60eecbbf0d7a4871561d41a",
"",
"mention"
],
[
"q",
"02df6b2d30fac0a465ae89ebd86fbe1d4b12898b7d21bc001a35d9ced775e331"
],
[
"zap",
"d7094945513d0072aa9e2d300c65fba336be751ef60eecbbf0d7a4871561d41a",
"wss://relay.damus.io",
"0.9"
],
[
"zap",
"b4713daf7ec8bbd39a9c4ded0ea58fa426fa1fb85a4125e83c70eba7ee6e1658",
"wss://nos.lol/",
"0.1"
]
],
"content": "I'm not saying the explanation you propose is impossible. It isn't. It's just highly improbable. Why dont you elaborate on why you think a $1.2 Billion company with 20 years of R\u0026D in threat identification, which was founded on the idea of identifying (email) spam, and was one of the first (maybe the originator of) \"firewall in the cloud\" services lacks the technical sophistication to identify legitimate connections from known VPN sources without imposing a captcha delay - a method which is, at best, of limited value in identifying bots.\n\n\"It's too complicated for them\" is just not sufficient.\n\nnostr:nevent1qqsq9hmt95c04s9yvkhgn67cd7lp6jcj3x9h6gduqqdrtkww6a67xvgppemhxue69uhkummn9ekx7mp0qgsdwz2fg4gn6qrj420z6vqvvha6xd47w500vrhvh0cd0fy8z4sagxsrqsqqqqqpr7cpre",
"sig": "16d76f4b4a97e6f03e413295eb6ff5ae184b4c92d926a3ec2aac93ff57612df1060dbfe2a54a384043bfdd823ca9939985be19028a7c2023668872169dc786a8"
}