{
"id":"897458c17e0468e27beff80e63e916a5c4ebf4394e32619905999b3b2d45c30f",
"pubkey":"fd208ee8c8f283780a9552896e4823cc9dc6bfd442063889577106940fd927c1",
"created_at":1726317552,
"kind":1,
"tags": [
[
"e",
"d4a0acfe388c7c482163d0e193dd3140efdd1d6a6f48eed0103cfca1f8453ccc",
"",
"root"
],
[
"e",
"202e39ec75867f71f4c7ea2778e30448601937fc9e6f3082f7251319a8c09be3",
"",
"reply"
],
[
"p",
"99bb5591c9116600f845107d31f9b59e2f7c7e09a1ff802e84f1d43da557ca64",
"",
"mention"
]
],
"content":"Yeah, that's actually the main weakness. We don't have too few relays instances, so much as we have too few relay implementations.\n\nFind an attack vector in one and then just pull them all down.",
"sig":"d17da72d3f60b7fd4b8086e35623c280017acb76f4594ec9b00ca9b177742d43ad2e0a67fd305051c39bdfbdd01c6d2655ce258d9e3754ee3a74eead3621f3c1"
}