Event JSON
{
"id": "88c752593a93b613b4c7cca4c49aaf56f0b872b99dc0ebf249e68f15e8e3b311",
"pubkey": "53c68210b43e46dae81371b56101c79babc8878ab32e951e30a337c55c9469ed",
"created_at": 1758062511,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.exchange/@drwhax/115216384742367967",
"web"
],
[
"proxy",
"https://infosec.exchange/users/drwhax/statuses/115216384742367967",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/drwhax/statuses/115216384742367967",
"pink.momostr"
],
[
"-"
]
],
"content": "Phoenix: Rowhammer Attacks on DDR5 with Self-Correcting Synchronization https://comsec.ethz.ch/research/dram/phoenix/\n\nETHZ pulled off another Rowhammer attack.",
"sig": "5a266aef901154fa5fd2a3e3c8998201f51ac24bccc764e48554436e6950b7aaca6dd75d59dbf78738b30c41242aa69d370e868fa36ac99b2b80e9e5e8795424"
}