{
"id":"91880d71d72f8f948e74693cb9b39b652f70c9c0cdeaef7dcee1b8d69c4ec1c1",
"pubkey":"f821179bd5d691c61b4356336388adadc3cc1304f49e771a87c38de7ed4fd022",
"created_at":1771690440,
"kind":1,
"tags": [
[
"e",
"a0d09a42ddf0567201c4015aebf8e6bd341efe08234702e7ddcfc12c28042cb3",
"wss://relay.fountain.fm",
"root"
],
[
"p",
"04c915daefee38317fa734444acee390a8269fe5810b2241e5e6dd343dfbecc9"
]
],
"content":"Has anyone actually broken down and explained why bip110 is a threat and an attack?\n\nI’d be interested to hear what it technically does.",
"sig":"9d776a582543d53c2de07450c9f4f5d5536ca36e95fc7b3fcbee394bd5be2dd50e4fabbd938302db8766446836889d385342176ff0eeb0fad2d74c7b8b58e21c"
}