https://www.schneier.com/blog/archives/2026/04/cybersecurity...

Cheyenne Isa ₿
npub1ssdszl2flqs33qdz8t9aqq4lkp7qm8qdwgxy4xwyye55tzlsacusgvunvc
hex
24b448a8c62c00a9dcd2b7a77beb21fa2ee237e5525a50d58993627c5339f6b6nevent
nevent1qqszfdzg4rrzcq9fmnft0fmmavsl5thzxlj4ykjs6kyexcnu2vulddsprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgsggxcp04ylsggcsx3r4j7sq2lmqlqdnsxhyrz2n8zzv62930cwuwgpymqq6Kind-1 (TextNote)
https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html
Raw JSON
{
"kind": 1,
"id": "24b448a8c62c00a9dcd2b7a77beb21fa2ee237e5525a50d58993627c5339f6b6",
"pubkey": "841b017d49f8211881a23acbd002bfb07c0d9c0d720c4a99c42669458bf0ee39",
"created_at": 1775700229,
"tags": [],
"content": "https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html",
"sig": "acbdbb789dcc9ce1d540bb356fe653f9c06c244e6bf495bcaf9bda383e57e7026796f390237bdc7eab95449fa46d4d0c0115f0c53fb8d4bd934d8141a2edc8ea"
}