Event JSON
{
"id": "2efa2f94bd3beecc4801b0bf7a8cbad198b1827e7db5c07b856d5ccb93b4da06",
"pubkey": "44393ff8ca21edda8e7e510a2d8aef91e6b71ff38969a69b356215bfb42bac19",
"created_at": 1715283650,
"kind": 1,
"tags": [
[
"proxy",
"https://mastodon.social/@simplex/112412829345045981",
"web"
],
[
"e",
"4ab34d1212a61f1fdade0454fadd6cbe00497869e216c759b47e16c578b2652f",
"",
"reply"
],
[
"e",
"eb98f82633a3e6cc641b83f69f3e4e4b3bc928ce8a46cce9ec4b95428fbaf2b1",
"",
"root"
],
[
"p",
"7baa42df007683d6139324445ae874d29ba187856b73c5f97d92806ab44b6897"
],
[
"p",
"e56ce8436edefe04004c2306bfa13c79b1bf9320c1497dc25c38c32398c7ea49"
],
[
"proxy",
"https://mastodon.social/users/simplex/statuses/112412829345045981",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://mastodon.social/users/simplex/statuses/112412829345045981",
"pink.momostr"
]
],
"content": "it certainly can be hashed - when user provides the main email and the recovery email, you can validate it. Obviously, user has to remember what the recovery email was for that to work. But a reasonable compromise would be to store hash, salt and x***@***.com pattern so a user could remember which recovery email was used (with or without correct letter count).",
"sig": "a3d864b8484b3c151fcd6327c4e3d41b53d8a7a8d2fdbded015ce767db0a7c5937ca45f6f92a4cc16fcc66c560060c3b36dcd18be48041f124e72eb9ad75e045"
}