Event JSON
{
"id": "b684d031531c7834b6f3b9d1bdbe57517a6ca3f7f58b8e412dbe06cb62df2f9a",
"pubkey": "3c65f4528f1db02ae90cd1ce3c494daf425c18dc5d3e854fb9bf73a55fe3fcd3",
"created_at": 1745424871,
"kind": 1,
"tags": [
[
"p",
"e9f3e98884379cc7508493fe84902557348c49d12cc8c4375d4188d02817584c",
"wss://relay.mostr.pub"
],
[
"p",
"657d6ebf3b54bc282e0f6c38fdbec4816896acb71335db6cd55fc506a13982e4",
"wss://relay.mostr.pub"
],
[
"e",
"30c75f4e350fa068a5fdc449c1ee5e5fab9eeeaecfbe54858ce145889e6f5250",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/hdm/statuses/114388164348927859",
"activitypub"
],
[
"client",
"Mostr",
"31990:6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9:mostr",
"wss://relay.mostr.pub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqa8e7nzyyx7wvw5yyj0lgfyp92u6gcjw39nyvgd6agxydq2qhtpxq324dv2 heads up - while the unit test/public exploits trigger the bug after kex and before newkeys, you can also exploit this (and we have) after the DH, so the exploit itself is post-encryption",
"sig": "2f59f727878325108f370dd2fbed3d2421d058e4effaa17ae5f540bc234a49623b2c97d13114a802a9a36676e56f027a61c28e8ec3486972856d959f908cf586"
}