Event JSON
{
"id": "efedd7cb64e3f62e379a4ba8faaae3f817c3108190c5b504f937ac3c50f44f73",
"pubkey": "b2d670de53b27691c0c3400225b65c35a26d06093bcc41f48ffc71e0907f9d4a",
"created_at": 1713383237,
"kind": 1,
"tags": [
[
"e",
"6a1c970dc23d993ecf64df969811c837f59854989722ce6c24bbe59a823ace27",
"wss://nostr.mom/",
"root"
],
[
"e",
"4c916076658d7728c9a1911ca6531b70ff7e04f3093422aeaabb8660bc0c1fe3",
"wss://nostr.oxtr.dev/",
"reply"
],
[
"p",
"1b5ee74df1f13eb85d54d36bc19a4180f44ce9aceeba2ea110f9ea79bb1aae6e",
"",
"mention"
],
[
"p",
"fce4177babd57f64d302a7f04db4d1174983e34fbfc27258060cb12ff504cdc8",
"",
"mention"
]
],
"content": "Is it really a brute force if the only password they use is 123456 and it's directed against one server? I read that people correlated the information with whatever information you need to sign up with Chivo but I also find that odd, won't most applications (especially banking related) collect mostly the same data? I'll call it a rumor until someone can prove that it came from Chivo's database.\n\nAlso, looks like you need a link to your nostr profile here:\nhttps://atlas21.com/author/federico-rivi/",
"sig": "0c97d2666458a23db49544d12bef669546f7ddb56ac6d55fb7a99d761ac9b956319d800cde645b827ed9398d34403a11fb108bc695c44631a0a869e574d259f9"
}