Event JSON
{
"id": "e617fe24ec0a1ddc7bf5cd919d6175cdd52433c0f211dd08df9d11ac91caab05",
"pubkey": "ea91ee2eff0942115b5515bbdbee1259bcf899f8dc79b33d58524d104e3d5eb5",
"created_at": 1775224630,
"kind": 0,
"tags": [
[
"client",
"Primal Web"
]
],
"content": "{\"name\":\"144MB\",\"about\":\"I sign Floppy PNGs with the same private key associated with this npub.\\n\\nMy entire software repo is inside my banner PNG, which, at least currently on Primal blossom, is not modified. It can be extracted with this script:\\n\\nDeno.writeFileSync(\\\"f.z\\\",Deno.readFileSync(\\\"f.png\\\").slice(41,-16))\\nnew Deno.Command('pigz',{args:['-d','-f','-k','f.z']}).outputSync()\\nlet extracted_data=Deno.readFileSync('f')\\nconst data_length=parseInt(new TextDecoder().decode(extracted_data.slice(65,4120)).split('\\\\n')[0])\\nconst unfiltered=new Uint8Array(extracted_data.length)\\nlet f=0,p=0,r=0\\ndo{if(r==4140||f==0){f++;r=0;} else {unfiltered[p]=extracted_data[f];r++;f++;p++;}}while(f\u003cextracted_data.length)\\nlet site_text=(new TextDecoder().decode(unfiltered.slice(542340,542340+data_length)))\\nDeno.writeTextFileSync('site.txt',site_text)\\n\\nNote that this should be verified. This particular image has a sha256 hash of: 138e86c494ddcc476df0d8e502d2d452daad249bd8c2519a5f25761741b04a8e\\n\\nBut, more importantly, I sign the data part of the PNG and use the top row to store the secp256k1 signature. This can be verified with this script:\\n\\nimport { sha256 } from \\\"@noble/hashes/sha2\\\";\\nimport { schnorr } from \\\"@noble/curves/secp256k1\\\";\\nimport * as pako from \\\"pako\\\";\\ntry {\\n let f = 0, p = 0, r = 0;\\n const fpng_img = Deno.readFileSync(Deno.args[0]);\\n const pub = Deno.readTextFileSync(Deno.args[1]).trim();\\n const zdat = pako.inflate(fpng_img.slice(41, -16));\\n const u = new Uint8Array(zdat.length);\\n do {\\n if (r == 4140 || f == 0) {\\n f++;\\n r = 0;\\n } else {\\n u[p] = zdat[f];\\n r++;\\n f++;\\n p++;\\n }\\n } while (f \u003c zdat.length);\\n const dl=parseInt(new TextDecoder().decode(zdat.slice(65,4140)).split('\\\\n')[0])\\n console.log(schnorr.verify(\\n new Uint8Array(zdat.slice(1, 65)),\\n sha256(u.slice(542340, dl + 542340)),\\n pub,\\n ));\\n} catch {\\n console.log(\\\"Usage: lverify [Floppy PNG] [144MB Hex Public Key]\\\");\\n}\\n\\nThe extract script itself can be extracted from the Floppy PNG using the instructions on the header of the banner of the PNG in my profile banner. It is all so wonderfully self-referential, no? \",\"picture\":\"https://blossom.primal.net/fa770c4491f194fb746c3bbd9949262b6fef8a98dab8a0c6e35a67bfd54a6c66.gif\",\"display_name\":\"144MB\",\"banner\":\"https://blossom.primal.net/138e86c494ddcc476df0d8e502d2d452daad249bd8c2519a5f25761741b04a8e.png\",\"displayName\":\"144MB\"}",
"sig": "d02e0fb12d15489d69172fc39594884764794643fa97c3270b38925abdc0b2a2d32a378caa3e4bbf65eeea3f2606e7726a51ca31d20352305e4ff4bb1009f03d"
}