Event JSON
{
"id": "e45ecf0699716f5a6c88cc8bf57fb8c0eace674755c9eb0f31817ef85e13ebef",
"pubkey": "266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5",
"created_at": 1727106034,
"kind": 1,
"tags": [
[
"e",
"a925ad36c8a1c264b788f98661a3613064bb0d25b73b6809e5dff6773029f9a6",
"",
"root"
],
[
"e",
"a925ad36c8a1c264b788f98661a3613064bb0d25b73b6809e5dff6773029f9a6",
"",
"reply"
],
[
"p",
"0adf67475ccc5ca456fd3022e46f5d526eb0af6284bf85494c0dd7847f3e5033",
"",
"mention"
],
[
"client",
"noStrudel",
"31990:266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5:1686066542546"
]
],
"content": "This isn't something I have control over, the hosting provider I'm using for the next version is automatically applying the `upgrade-insecure-requests` CSP rule https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/upgrade-insecure-requests\n\nWorking on a better hosting solution, but until then the next version can connect to ws:// or http:// 😞 ",
"sig": "92418b7b0de948b96d4205bbaefa96f2b7cdb741bc53357ec09a3e6e8c80061a522bf44be3f02e249e14110ecd950f0011223adebca19ab526b3614a3b4b508a"
}