{
"id":"56f37923bdd3d6865a64b060bbb60eaa1c580b2f074e8d4fdab7490bb1c134b4",
"pubkey":"7acf30cf60b85c62b8f654556cc21e4016df8f5604b3b6892794f88bb80d7a1d",
"created_at":1734528969,
"kind":1,
"tags": [
[
"e",
"4d2699e52aee379ac621d89c07514e24bb2f55dd57c52214d74ba8a019ff1165",
"",
"root"
],
[
"p",
"a60e79e0edad5100d7543b669e513dbc1c2170e8e9b74fdb8e971afd1e0e6813"
]
],
"content":"Normally a small code base is always better. So how do all these additional security features, increase potential attack vectors/risks?",
"sig":"b1bc1d331a756a6e91a58d74e86552cd114de478eefa9d7bfcc81e1ed8e1866dde1020f84669e40bca346283082e481d076344c260ce5bace98eda5d6e68ea86"
}