Event JSON
{
"id": "563ad12a2b945fff757257c6e80e80a7e1a975b9750067b576448bbe6f296064",
"pubkey": "f7337b891a4ffec5f79f80ac0a2d05c7d05418db3462319633d74b20cb9557cc",
"created_at": 1773060403,
"kind": 1,
"tags": [
[
"t",
"tcd"
],
[
"t",
"trafficcontroldevice"
],
[
"t",
"trafficsignal"
],
[
"t",
"emergency"
],
[
"t",
"spoofing"
],
[
"t",
"vehicle"
],
[
"proxy",
"https://bofh.social/notes/ajmqp4ny1rn80011",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://bofh.social/notes/ajmqp4ny1rn80011",
"pink.momostr"
],
[
"-"
]
],
"content": "This looks like a fun project! #TCD #TrafficControlDevice #TrafficSignal #spoofing #emergency #vehicle\n\nhttps://hackaday.com/2026/03/08/spoofing-an-emergency-traffic-preemption-signal/",
"sig": "ecba6e67411d554a5360ee18362365ab054c2a4f6f6fb66e56ce789545365d811d13168f62c4904fe9f7527ec7e6102d89623ffe473ac0e08933aa477b0f6889"
}