Event JSON
{
"id": "29f9cfdd6beac0ed64f13929a314814189dc6f29f5ca293971c46ba1fc8732af",
"pubkey": "4b2c1109f7ad0e2080417588f9443bd4a4002fb34e4cd91c0c1e7a6ee076eaa1",
"created_at": 1746606600,
"kind": 1,
"tags": [
[
"p",
"7f5cc943e56af1b52d9dbbde8a6140591aaf9e96a00de5fd71141246c68e2f74",
"wss://relay.mostr.pub"
],
[
"p",
"a888afc70b064abaef50057ca57e8b8c25b940fe8227cf9034c9805916b881e3",
"wss://relay.mostr.pub"
],
[
"proxy",
"https://flipboard.com/users/heiseonline/statuses/BXjRfAZfQOyVxt6NkWGWcg:a:2831390041",
"activitypub"
],
[
"client",
"Mostr",
"31990:6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9:mostr",
"wss://relay.mostr.pub"
]
],
"content": "Cyber Threat Intelligence an einem Fallbeispiel erklärt\nhttps://www.heise.de/hintergrund/Cyber-Threat-Intelligence-an-einem-Fallbeispiel-erklaert-10353635.html?utm_source=flipboard\u0026utm_medium=activitypub \n\nGepostet in Nachrichten nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpq0awvjsl9dtcm2tvah00g5c2qtyd2l85k5qx7tlt3zsfyd35w9a6qxac0qd",
"sig": "0e4ac61405eb3a192e70e70db3c68aa87705204c6a4c55157e44f3309d14f9695afbb0f55c7dc829869390d203f4e7c180624cf68e227f6c94322a04f98b5c32"
}