Event JSON
{
"id": "48e405b8ead442b4a79a555a8ea98e3fa19bfae2ce2ad8554a69a1099b529fc7",
"pubkey": "d451865ead7381ba902a27a34a2f8587b3a08b60fe3f10f8fbf33745241ecc8b",
"created_at": 1716208332,
"kind": 1,
"tags": [
[
"e",
"60c538336343194e10783f6fe425c62ca9a063a6653962579fcb17f6f84d4123",
"wss://nostr.mutinywallet.com/",
"root"
],
[
"e",
"5b94646bab6373a3a8d151046319f573e8f0f6533960b0e1e227b7580f93f5b8",
"wss://relay.nostr.band/",
"reply"
],
[
"p",
"e989aa6e0137d52a410ecd89ae59f7adbfb0bdec9786b9181c3707954b4cfa69",
"wss://eden.nostr.land/",
"mention"
]
],
"content": "What do I think about emojis? Hmm... Don't even know...\nhttps://www.vice.com/en/article/wxnj49/this-string-of-emojis-is-actually-malware\nhttps://cybersecuritynews.com/hackers-can-use-emojis-to-deliver-exploit-to-the-target/\n\nFirst two results by searching \"emoji exploit\" on the webs.\n\nI have nothing against the other two things but they are not to be in any program source code either.",
"sig": "67019bfdadbb195247b63e6245a9d9e5dee675a010ecbafa1ea590397925eef943891146fda6dc23348eabf89dc82b521f6633ea9dd3889baae6744011b72061"
}