{
"id":"20378b24e2cbe9bec3118fcba16e7ad2d7e16da9f440c93e81a55ae6ce3b6564",
"pubkey":"9267545d2917b80f707ffdb44a8ff979182568ef7baa04ee756b1f01d4e3688a",
"created_at":1726647771,
"kind":1,
"tags": [
[
"p",
"472f440f29ef996e92a186b8d320ff180c855903882e59d50de1b8bd5669301e"
],
[
"a",
"30023:472f440f29ef996e92a186b8d320ff180c855903882e59d50de1b8bd5669301e:1726625613517",
"",
"root"
]
],
"content":"The need for open source hardware with transparent and verifiable tamper proofing is clearer than ever.\n\nDevice detonation is beyond anything I would have thought possible. Covert surveillance through hardware is much less difficult to imagine. ",
"sig":"e982f1613c9c4f5645ceadae3c498dfe37ce302bf69f36947878d1aabced40678988182ad816c4c504e025bf58d1e7062650cf5c716d4c6d137263c326891a41"
}