{
"id":"447d42abe721b1b3d08ecb33e41c4d033148820cf7ff3039cebcfc23ad1ec251",
"pubkey":"2779f3d9f42c7dee17f0e6bcdcf89a8f9d592d19e3b1bbd27ef1cffd1a7f98d1",
"created_at":1715783089,
"kind":1,
"tags": [
[
"e",
"30c54f68c189ee7ddea4cdb5b5fa1acbaba47986dcc06c26805001a985bc3a50",
"",
"root"
],
[
"p",
"3bf0c63fcb93463407af97a5e5ee64fa883d107ef9e558472c4eb9aaaefa459d"
]
],
"content":"How does someone on the receiving end decode which keys were used to sign the event after the fact?",
"sig":"3e19eda836768c41faed7e705b83e3cab796bca96dd7ceb082a8a7060eafd0ffd409b9a19071f826118f7f151262f548a7f00a18852ab4f175c524dd60237688"
}