nostr relay proxy
event page
37f2654c:3c48723a
posted
a day ago
Cell phone networks are ridiculously porous and weak. Build your threat model accordingly. nostr:note10rltzw2v553n3cwk9du8uudwlm6pg6epe89xupyzjxm6nzrl7fns48x5lf
rendered in 744.505µs