Event JSON
{
"id": "745abb84e6e8655bae64f2505b6b9ee7f8a4a614598febd44c89427bc1dfe018",
"pubkey": "9a88d2f3477a49ae1b5c4fa0db0ef13f88c8a4f24ce9b0d4144a43c71f7b39f8",
"created_at": 1775741497,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.exchange/@josephcox/116374994792773696",
"web"
],
[
"proxy",
"https://infosec.exchange/users/josephcox/statuses/116374994792773696",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/josephcox/statuses/116374994792773696",
"pink.momostr"
],
[
"-"
]
],
"content": "New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted. Why? Because parts of messages were stored in the iPhone's internal notification database. Shows how secure chat data can come from unexpected places https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/",
"sig": "433c151f15bc422b8ce80110f2a5ae28428ef88a079ee4c14d7da94a0c930026dd871bb4b74904e2147f3f1083907e1137945e52a26ab645b31d2b160df2a6bc"
}