If you have nothing to take, then you're fine. Getting into ...

npub1qdjn8j4gwgmkj3k5un775nq6q3q7mguv5tvajstmkdsqdja2havq03fqm7
hex
5d08d4c63c2fbfc7f323fefec311c745f26aa13115318356be47301fd18ff5b0nevent
nevent1qqs96zx5cc7zl0787v3lalkrz8r5tun25yc32vvr26lywvql6x8ltvqprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgsqxefne258ydmfgm2wfl02fsdqgs0d5wx29kweg9amxcqxew4t7kqc84rmqKind-1 (TextNote)
↳ 回复 d2841371... (npub162zpxufpw8pnuytaf0gfxzkqtvk9rvcwkvppa7x57y3n7qkfpg4shatdhy)
nostr:npub1qdjn8j4gwgmkj3k5un775nq6q3q7mguv5tvajstmkdsqdja2havq03fqm7 I'm using a completely different computer that I've wiped clean. It'll have noth...
If you have nothing to take, then you're fine. Getting into the weeds on what you should do is not really a topic for a nostr thread. I just think you can get miles ahead if you apply my silly metaphor habitually.
But don't assume it's safe to put on your network, if you have other things on your network. Remember everything you're doing is being leaked in plain english to your inference provider as well. It's still far safer if you just tell me exactly what files you have on your computer, what devices you have on your network, and which one of these people in this photo is you, and which is your mother?
原始 JSON
{
"kind": 1,
"id": "5d08d4c63c2fbfc7f323fefec311c745f26aa13115318356be47301fd18ff5b0",
"pubkey": "036533caa872376946d4e4fdea4c1a0441eda38ca2d9d9417bb36006cbaabf58",
"created_at": 1773419605,
"tags": [
[
"e",
"0c7792c72cb6bb0ef0c4bc956fe3fb70bafcdeb3ff632470e7d4dd3420026ceb",
"wss://nortis.nostr1.com/",
"root",
"e83b66a8ed2d37c07d1abea6e1b000a15549c69508fa4c5875556d52b0526c2b"
],
[
"e",
"063c964de15da25c52a4b0b0be07b65d00cd5c37c696b134750e2fdc0bd603d8",
"wss://theforest.nostr1.com/",
"reply",
"d28413712171c33e117d4bd0930ac05b2c51b30eb3021ef8d4f1233f02c90a2b"
],
[
"p",
"036533caa872376946d4e4fdea4c1a0441eda38ca2d9d9417bb36006cbaabf58"
],
[
"p",
"4d7842051782e0d3feb034d150adc2b6bae4ee3b49786793bffa468b6f5b96b3"
],
[
"p",
"68c90cf34467b2c40949f0522b69d759d3fe8709653fa1d49aa0514099458f5c"
],
[
"p",
"e83b66a8ed2d37c07d1abea6e1b000a15549c69508fa4c5875556d52b0526c2b"
],
[
"p",
"d28413712171c33e117d4bd0930ac05b2c51b30eb3021ef8d4f1233f02c90a2b"
]
],
"content": "If you have nothing to take, then you're fine. Getting into the weeds on what you _should_ do is not really a topic for a nostr thread. I just think you can get miles ahead if you apply my silly metaphor habitually. \n\nBut don't assume it's safe to put on your network, if you have other things on your network. Remember everything you're doing is being leaked in plain english to your inference provider as well. It's still far safer if you just tell me exactly what files you have on your computer, what devices you have on your network, and which one of these people in this photo is you, and which is your mother?",
"sig": "74cd89fd67156b889d7f436cbaecfce5369df994762247929e351fc80c3bed699a1441c65c2d192ee5a71a2f5a696306e2ef725b76914e110d322189d172d909"
}