https://www.schneier.com/blog/archives/2026/04/cybersecurity...

Cheyenne Isa ₿

npub1ssdszl2flqs33qdz8t9aqq4lkp7qm8qdwgxy4xwyye55tzlsacusgvunvc

hex

24b448a8c62c00a9dcd2b7a77beb21fa2ee237e5525a50d58993627c5339f6b6

nevent

nevent1qqszfdzg4rrzcq9fmnft0fmmavsl5thzxlj4ykjs6kyexcnu2vulddsprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgsggxcp04ylsggcsx3r4j7sq2lmqlqdnsxhyrz2n8zzv62930cwuwgpymqq6

Kind-1 (TextNote)

2026-04-09T02:03:49Z

https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html

Raw JSON

{
  "kind": 1,
  "id": "24b448a8c62c00a9dcd2b7a77beb21fa2ee237e5525a50d58993627c5339f6b6",
  "pubkey": "841b017d49f8211881a23acbd002bfb07c0d9c0d720c4a99c42669458bf0ee39",
  "created_at": 1775700229,
  "tags": [],
  "content": "https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html",
  "sig": "acbdbb789dcc9ce1d540bb356fe653f9c06c244e6bf495bcaf9bda383e57e7026796f390237bdc7eab95449fa46d4d0c0115f0c53fb8d4bd934d8141a2edc8ea"
}