{
"id":"6f635c9bc542b8045e3b3ef60d0124b8a17b07c23bf0d19b2fe048b70e16b885",
"pubkey":"0371db7fd4437ce63e60dedc313cad6ee8b17fc691fe05231f9a140134fc0d08",
"created_at":1723410228,
"kind":1,
"tags": [
[
"p",
"e88a691e98d9987c964521dff60025f60700378a4879180dcbbb4a5027850411",
"",
"mention"
],
[
"t",
"Bitcoin"
]
],
"content":"The risk of hidden malicious code is why general purpose computers aren’t suitable for #Bitcoin security.\n\nWith embedded hardware, you can have much more confidence that the device has not been tampered with, reducing the risk of attacks like Dark Skippy.\n\nnostr:npub1az9xj85cmxv8e9j9y80lvqp97crsqdu2fpu3srwthd99qfu9qsgstam8y8 explains in BR072.\nhttps://m.primal.net/JwSq.mov",
"sig":"377008ac1b860f60ba7854defd311e33b0af315002c7b68fa6da13dd16f13ce0f6cf00cc706cfd0bbf7754987e2f76066d8f25e0d3425b554f8a4c636f2cbc82"
}