Event JSON
{
"id": "4bfbc036e3df36b0fbb67f34116b8f2033c4e4a351479fe864dd6f900afc7d68",
"pubkey": "b3ba3c5045fbaf99be9cb4daa9f1d7baeedaba0fc5b91596511e2fb7a70dd7f9",
"created_at": 1725393532,
"kind": 1,
"tags": [
[
"proxy",
"https://grapheneos.social/@GrapheneOS/113075390524722562",
"web"
],
[
"p",
"b3ba3c5045fbaf99be9cb4daa9f1d7baeedaba0fc5b91596511e2fb7a70dd7f9"
],
[
"e",
"02c177490db989300e913eaef0e0c5968b5f832929855fcfff3ea4e4365642dc",
"",
"root",
"b3ba3c5045fbaf99be9cb4daa9f1d7baeedaba0fc5b91596511e2fb7a70dd7f9"
],
[
"e",
"d9da313a74596d6b803fd633675ebcdbfa7f1b8722b6522d600a534aafdac2dc",
"",
"reply",
"b3ba3c5045fbaf99be9cb4daa9f1d7baeedaba0fc5b91596511e2fb7a70dd7f9"
],
[
"proxy",
"https://grapheneos.social/users/GrapheneOS/statuses/113075390524722562",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://grapheneos.social/users/GrapheneOS/statuses/113075390524722562",
"pink.momostr"
],
[
"-"
]
],
"content": "We extended wipe-without-reboot with extra wiping and use it as part of our duress PIN/password feature.\n\nForensic companies are still able to exploit stock OS Pixels, but reset attack mitigation helps prevent bypassing GrapheneOS security via firmware.\n\nhttps://grapheneos.social/@GrapheneOS/112826160880324005",
"sig": "82131df787b4d50976b4146d8645dfd6b2a0d76e9a7daa2560e614aeeb19c807021c23324c18d42058023ee40410ec0f65e2705bb5afd5d36fbbd9d5d14e9252"
}