Event JSON
{
"id": "b2b39cacf7165a05067234d8060755b18ccb64434d880652906b5924d5ab98cd",
"pubkey": "5468bceeb74ce35cb4173dcc9974bddac9e894a74bf3d44f9ca8b7554605c9ed",
"created_at": 1749229764,
"kind": 1,
"tags": [
[
"p",
"d3694571e389dfe9b881db6f901a7a232aaf11a58e9ae73b3a3933fe6e14ab95",
"wss://relay.mostr.pub"
],
[
"p",
"0f32a30a26681e37fe1698cb6f312703ded9dcb47b4903b7d4814ea0a30d2838",
"wss://relay.mostr.pub"
],
[
"e",
"7820363f9a058d5d1c4d728f33df65e20c65f0f6500b021552423076d31512b6",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://grapheneos.social/users/GrapheneOS/statuses/114637521844763295",
"activitypub"
],
[
"client",
"Mostr",
"31990:6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9:mostr",
"wss://relay.mostr.pub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpq6d552u0r3807nwypmdheqxn6yv427yd936dwwwe68yelums54w2ssajv2z You do not need app accessible root access to filter DNS requests or network traffic beyond that. However, you are not going to provide any substantial form of privacy through using block lists enumerating badness. Those can only block looking up DNS names which are solely used for unwanted things and not useful things. Services combining those together prevents this being done since you aren't going to be using apps if you're blocking the services they use. The approach does not work.",
"sig": "413b537a91aa4842879aec312b18439cec28075bdaf7dd8aedd6eca8de7bf899f6c7d7d8553254cb10d0972f5c3bd3632ea472dbf264963d6b2e0a0dcfa797da"
}