Event JSON
{
"id": "4c1e1c42ef3a31debc7192d48f1127fc7756fe14fdc8bb35bbe8d269c824cd33",
"pubkey": "0d6f3fb7f3c83755ea731380516167da6691cea0d7ddf4865505d291687ca343",
"created_at": 1680553098,
"kind": 1,
"tags": [
[
"e",
"4229f42b31525501ee3fba4a5d440b8069a51ea5f35d0c3183d16208dbc19d88",
"",
"root"
],
[
"e",
"445f4c2dfebe977a1f5e75c8de785928b49890003741f4f38b3bf6511847297b",
"",
"reply"
],
[
"p",
"69dfcf1cf5be81090d9d95314ffb81e0230b9f569d350cb2babe608d4faaf3b0"
],
[
"p",
"ba8d60f60e55142c5ab75764d844ef141182cfb96f9ed8a1e09907971f4332b7"
],
[
"p",
"36e8d5095a5b9a6c828efab190c7724122e11576ad1f60ab84203eccbf0c6a1e"
],
[
"p",
"a46113223addbb60781a9e62a32cf1d5868ca251775adc8b517b394f6656770e"
],
[
"p",
"69dfcf1cf5be81090d9d95314ffb81e0230b9f569d350cb2babe608d4faaf3b0"
],
[
"p",
"1e706011c932ba1b800d5287c91a527f060822e8858e66ac76effd97c14f7ebd"
],
[
"p",
"1b9fe6576503dfe753e5e67f64424b27c2e12b1060ae2485e666b5b8fc99ca26"
],
[
"p",
"0d6f3fb7f3c83755ea731380516167da6691cea0d7ddf4865505d291687ca343"
],
[
"p",
"0d6f3fb7f3c83755ea731380516167da6691cea0d7ddf4865505d291687ca343"
],
[
"p",
"0d6f3fb7f3c83755ea731380516167da6691cea0d7ddf4865505d291687ca343"
],
[
"p",
"53a8392e971b46326e3d0f8967db17c4f7cca4d42be979b1664124c8f69af528"
]
],
"content": "在回复@npub1rw07v4m9q007w5l9uelkgsjtylpwz2csvzhzfp0xv66m3lyeegnq4fpemg 后我想到了另一种思路,其实绝大部分人的安全性操作~= 0; 那现实很可能是更简单,这些被钓鱼的人大概都直接在微信 或 微博转发过twitter上的内容。然后被传召了也不会删内容(他们自己肯定也觉得没干坏事,没必要),然后就执法人员很简单能解锁手机。或者直接上门带走/路边检查站,连思考删除内容的时间都没有。\n\n根据现在国内网络对文字图片内容秒删的审核度,这些网站都有对用户的发的内容的记录。那把这些记录中“高危”的用户抽一点出来就可以了(例如直接发言反党 反领导人的那批)。\n\n毕竟要揪出编程随想那样的操作即使可行,都太耗费时间精力了;我猜大部分钓鱼执法的实质就是那样",
"sig": "b6e93dc1c88bac2378086ee5455838ea05f07f4e84be4ad5767754a67594e80c9632f6df0827492e4520c05ae230e73d5199ce23f2eea31d6cd59b4e8d7c4cb3"
}