Event JSON
{
"id": "ccd94fd77432bc8571757aa9e46223c5c54fd526728ec3fce5e3a6677c702a89",
"pubkey": "6de5bdbc5099c9e960288edd743af8d1c0ddfc8be5daccf54ca7a6559109f52b",
"created_at": 1743786372,
"kind": 1,
"tags": [
[
"p",
"6457e4cdb54b83bcf3513e107abd545032e503b45668899b6144931d2597581f",
"wss://relay.mostr.pub"
],
[
"p",
"c920b90bfa83d2af1e0b0a86772b234c054d37acff334b76a405c14b98d5fa14",
"wss://relay.mostr.pub"
],
[
"t",
"DerechosDigitalesColectivos"
],
[
"proxy",
"https://mastodon.social/users/sursiendo/statuses/114280783712007693",
"activitypub"
]
],
"content": "¿Cómo compruebo que mis dispositivos son seguros?\n\nConsejos básicos para fortalecer la seguridad de tus dispositivos\n\npor nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqv3t7fnd4fwpmeu638cg840252qew2qa52e5gnxmpgjf36fvhtq0sx8cere \n\n#DerechosDigitalesColectivos \n\nhttps://docs.fembloc.cat/dispositivos-seguridad-buenas-practicas-hardware-software.html",
"sig": "ac7e7d66eaf69b1a38058d0b537211a465855001bb0fa1946f4026f1eeb35a7fee0909c4342ca8273c34aeda7bdd3a0908e9e4967ec6df9a4c6f7d24c0d6bdd9"
}