Event JSON
{
"id": "eed292a15abf57d838a385f2df019da85fc34d6355364440afbee9c819247c94",
"pubkey": "bbf233debd45328b8bda2bce341cbf258d1f2337e6f31006d0c1b2f29088bd35",
"created_at": 1703089136,
"kind": 1,
"tags": [
[
"p",
"f7d0478e54eaa6e0cc98adf81d712148bce169a2c21b1c0f7a4ed446c6adc09e",
"wss://relay.mostr.pub"
],
[
"p",
"f6870afcde4480ec8508f50304859e14a51309ff24ab3f0f862c52bdc4af8747",
"wss://relay.mostr.pub"
],
[
"e",
"ee7bc8d040259738fa560e47065f63946fcb2c88ed17b84b5bbd5a8d6bd2a266",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/chort/statuses/111613649659037033",
"activitypub"
]
],
"content": "nostr:npub17lgy0rj5a2nwpnyc4hup6ufpfz7wz6dzcgd3crm6fm2yd34dcz0qlk9uux Just in terms of how quickly they got hit. Not everything that's vulnerable gets hit right away. Even if attackers scripted the harvesting, they don't have the bandwidth to use all the sessions simultaneously.\n\nOn the other hand... Comcast should have known to invalidate the sessions, so that would be a fail.",
"sig": "9894520a9489134b3213277c5552799f5017add51ba05e1d674941011ec83258dae87fb350ba97ecd731676fa085a62197e2c9e897bd99f73fb33cc87a6c9ce6"
}