Again. If state across knew how to break hardware attestatio...

Juraj
npub1m2mvvpjugwdehtaskrcl7ksvdqnnhnjur9v6g9v266nss504q7mqvlr8p9
hex
6246b93fab0c8229541c1c203431f02cd1c4f5e913d6bb814697e1fc033ed2ednevent
nevent1qqsxy34e874seq3f2swpcgp5x8cze5wy7h53844ms9rf0c0uqvld9mgprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgsd4dkxqewy8xum47ctpu0ltgxxsfemeewpjkdyzk9ddfcg286s0ds0dkm99Kind-1 (TextNote)
↳ 回复 Leo Wandersleb (npub1gm7tuvr9atc6u7q3gevjfeyfyvmrlul4y67k7u7hcxztz67ceexs078rf6)
So ... how about state actors? Don't you think they would put up honey pots to read your prompts? Not to steal crypto but to gain intelligence. Not to...
Again. If state across knew how to break hardware attestation, they have much more important targets than you vibe coding cryptoanarchy. Every use of such exploit increases the risk of discovery.
They can zero day many OS, but they would do that for Taliban tribe leader, not for you.
原始 JSON
{
"kind": 1,
"id": "6246b93fab0c8229541c1c203431f02cd1c4f5e913d6bb814697e1fc033ed2ed",
"pubkey": "dab6c6065c439b9bafb0b0f1ff5a0c68273bce5c1959a4158ad6a70851f507b6",
"created_at": 1774516243,
"tags": [
[
"e",
"7e75f25eece265238b5ea6020c85b730c84a5ebc670ce8a4b99634f928e2be19",
"",
"root"
],
[
"e",
"53c6b33e593480fb09f705f8e6ac80a7fa69ac68fb5796515c5f7cf63cfa89d7",
"",
"reply"
],
[
"p",
"46fcbe3065eaf1ae7811465924e48923363ff3f526bd6f73d7c184b16bd8ce4d"
]
],
"content": "Again. If state across knew how to break hardware attestation, they have much more important targets than you vibe coding cryptoanarchy. Every use of such exploit increases the risk of discovery. \n\nThey can zero day many OS, but they would do that for Taliban tribe leader, not for you.",
"sig": "91f4c71d779b583df04dfb07ed727f6c362094cf4df9ede6adfb1a8e761cf03e43b81243cbbb27bdb040fa7963dfe0adf22276eeed6ee161c98a198c52c04046"
}