Back to profiles
Profile Banner

CyberSecCanon

7597c93ebd9503aaa8b97db5d9f79f29647e1f7798c4228514ab1096233bbcbc

About

We vet #Cybersecurity books. Our reviews are written by real life experts, heroes, and hackers who led through the biggest exploits. www.cybercanon.org

Metadata

DID Document

{
  "@context": [
    "https://www.w3.org/ns/did/v1",
    "https://w3id.org/nostr/context",
    "https://w3id.org/security/suites/ed25519-2020/v1"
  ],
  "id": "did:nostr:7597c93ebd9503aaa8b97db5d9f79f29647e1f7798c4228514ab1096233bbcbc",
  "verificationMethod": [
    {
      "id": "did:nostr:7597c93ebd9503aaa8b97db5d9f79f29647e1f7798c4228514ab1096233bbcbc#key1",
      "controller": "did:nostr:7597c93ebd9503aaa8b97db5d9f79f29647e1f7798c4228514ab1096233bbcbc",
      "type": "SchnorrVerification2025"
    }
  ],
  "authentication": [
    "#key1"
  ],
  "assertionMethod": [
    "#key1"
  ],
  "profile": {
    "id": "did:nostr:event:b9e51bbb1652ba09f4c01e623aaa8649cf4f79d84731e5c3aca4cb8a15be8723",
    "name": "CyberSecCanon",
    "about": "We vet #Cybersecurity books. Our reviews are written by real life experts, heroes, and hackers who led through the biggest exploits.   www.cybercanon.org",
    "picture": "https://media.infosec.exchange/infosec.exchange/accounts/avatars/110/550/422/790/059/634/original/6b0c7fa8e8f9bd64.jpg",
    "banner": "https://media.infosec.exchange/infosec.exchange/accounts/headers/110/550/422/790/059/634/original/b42d7f768db43053.jpg",
    "nip05": "CyberSecCanon@infosec-exchange.mostr.pub",
    "created_at": 1755045476,
    "updated_at": "2025-08-13T00:37:56.000Z"
  },
  "service": [
    {
      "id": "did:nostr:7597c93ebd9503aaa8b97db5d9f79f29647e1f7798c4228514ab1096233bbcbc#bitcoin-taproot",
      "type": "TaprootAddress",
      "network": "tbtc4",
      "serviceEndpoint": "tb1pwktuj04aj5p6429e0k6anaul99j8u8mhnrzz9pg54vgfvgemhj7q6gmpm2"
    },
    {
      "id": "did:nostr:7597c93ebd9503aaa8b97db5d9f79f29647e1f7798c4228514ab1096233bbcbc#bitcoin-mainnet-taproot",
      "type": "TaprootAddress",
      "network": "btc",
      "serviceEndpoint": "bc1pwktuj04aj5p6429e0k6anaul99j8u8mhnrzz9pg54vgfvgemhj7qdqdwp9"
    }
  ]
}

Raw JSON

{
  "_id": "689bde64f62442432165feed",
  "pubkey": "7597c93ebd9503aaa8b97db5d9f79f29647e1f7798c4228514ab1096233bbcbc",
  "content": "{\"name\":\"CyberSecCanon\",\"about\":\"We vet #Cybersecurity books. Our reviews are written by real life experts, heroes, and hackers who led through the biggest exploits.   www.cybercanon.org\",\"picture\":\"https://media.infosec.exchange/infosec.exchange/accounts/avatars/110/550/422/790/059/634/original/6b0c7fa8e8f9bd64.jpg\",\"banner\":\"https://media.infosec.exchange/infosec.exchange/accounts/headers/110/550/422/790/059/634/original/b42d7f768db43053.jpg\",\"nip05\":\"CyberSecCanon@infosec-exchange.mostr.pub\",\"fields\":[[\"website\",\"https://cybercanon.org/\"],[\"verification\",\"https://cybercanon.org/\"]]}",
  "created_at": 1755045476,
  "id": "b9e51bbb1652ba09f4c01e623aaa8649cf4f79d84731e5c3aca4cb8a15be8723",
  "kind": 0,
  "sig": "12fcd81c0cd7beae0400010cace62d208bdcdf754ecb41057210aadcdc31efeef23ebea91b7e143507b36df8bf38465dbbc7f7db3d61bb50fd5ecdc27b5aab97",
  "tags": [
    [
      "proxy",
      "https://infosec.exchange/users/CyberSecCanon",
      "activitypub"
    ],
    [
      "client",
      "Mostr",
      "31990:6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9:mostr",
      "wss://relay.mostr.pub"
    ]
  ],
  "updated_at": "2025-08-13T00:37:56.000Z"
}