Event JSON
{
"id": "b66d379c3cca1a711e4ec291519d841923aca7b1ba4a8cdbf33e3993d9bb3425",
"pubkey": "85be76c7fab8c47f4e66018225d591842bd3984bfe0e8d135b8ee93aa7d467f6",
"created_at": 1740465805,
"kind": 1,
"tags": [
[
"p",
"cf860c4034090328f71471a6c44dc6db7f45df3a7b90877c045f4db2d81f7e1b",
"wss://relay.mostr.pub"
],
[
"p",
"ddaef735ba82c4c8eb3942423bf54420567582fd5b68ed1046a7e18c9f780bfe",
"wss://relay.mostr.pub"
],
[
"e",
"41a71e75b444c974936c0416b156b466d0fa145ebea7735661d9a5ca334f47bc",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/tjbutt58/statuses/114063167006195173",
"activitypub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqe7rqcsp5pypj3ac5wxnvgnwxmdl5the60wggwlqytaxm9kql0cdsaxd2rl sometimes those people have just moved on to second careers 😊\n\nFor compliance in Australia the standards are generally the ACSC Essential 8, and for government the ISM (Information Security Manual)\n\nI second your advice, but it would take a lot to get me back to COBOL",
"sig": "faeebde98577c3d63d75de287637911c1d493e5e858597a53f6e9bb5ff5d60d62257c9f046b9b008ac092528d0dabb93416a7305e343ed6a5b626c7e9cc06acc"
}