Event JSON
{
"id": "ca630912e7d8dfc46d6a6b67abb7ceb2253747aa6a29f6501e99099ccdd88e6a",
"pubkey": "6b3b9e7f61cdf2ee3defb5930b7f8be364c6d9b1787fc454b94ce0a1b7754dd1",
"created_at": 1745474626,
"kind": 1,
"tags": [
[
"p",
"902a648b581c8609bc006c44f7011fd46d88ed7b7f62ccd001177b9e292b3c24",
"wss://relay.mostr.pub"
],
[
"p",
"c7ae8d87b04952d1ee541fbc8d3de86f76bbc574d9656fef07ccd0e601b25456",
"wss://relay.mostr.pub"
],
[
"e",
"c5e27226cc3cc01d94d430413496598bf29c233476a66d894fc6e985ea046bc6",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/still/statuses/114391425152020561",
"activitypub"
],
[
"client",
"Mostr",
"31990:6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9:mostr",
"wss://relay.mostr.pub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqjq4xfz6crjrqn0qqd3z0wqgl63kc3mtm0a3ve5qpzaaeu2ft8sjqc0fe6n in many of the incidents we and our peers have seen, they have already EoP'd post-exp with root, and are then replacing core components with tampered ones. My original question was does the system not have some level of validity checks that can ensure the integrity of the binaries. I don't believe this is misleading in any way. As for \"the privileged users can do everything,\" I've seen a few good solutions here that are possibly still resilient under a privileged scenario?",
"sig": "e7a24a7e0466a96705b03305558a3b98de69cec292c529a7c571dedc57f5260e0b6392cba493c2035481ea6c2f1d9bc41a4f6baa31b85e6b6653e305d4cf9759"
}