nostr relay proxy

event page

{"id":"153680671ae78ed1d60469205a278ffb37cbfc2484f9d5428b8a23810a48f9d5","created_at":1728159484,"pubkey":"0371db7fd4437ce63e60dedc313cad6ee8b17fc691fe05231f9a140134fc0d08","sig":"632a992fe0f48dcd3e6121617b416aafcc66ec64354d0000cb1228fdee3cb41b4b962c7efc00325613caa0b95eec69e85b7555fb0acf8946f4a36d9e9bff146a","tags":[["p","e88a691e98d9987c964521dff60025f60700378a4879180dcbbb4a5027850411","","mention"]],"kind":1,"content":"Different hardware wallets have different secure models and tradeoffs to defend against various types of attacks.\n\nnostr:npub1az9xj85cmxv8e9j9y80lvqp97crsqdu2fpu3srwthd99qfu9qsgstam8y8 and Lloyd Fournier discuss some of these attacks, and how the risks can be minimized, in BR073.\nhttps:\/\/m.primal.net\/LMNp.mov"}

rendered in 258.493µs