We vet #Cybersecurity books. Our reviews are written by real life experts, heroes, and hackers who led through the biggest exploits. www.cybercanon.org
{
"@context": [
"https://www.w3.org/ns/did/v1",
"https://w3id.org/nostr/context",
"https://w3id.org/security/suites/ed25519-2020/v1"
],
"id": "did:nostr:7597c93ebd9503aaa8b97db5d9f79f29647e1f7798c4228514ab1096233bbcbc",
"verificationMethod": [
{
"id": "did:nostr:7597c93ebd9503aaa8b97db5d9f79f29647e1f7798c4228514ab1096233bbcbc#key1",
"controller": "did:nostr:7597c93ebd9503aaa8b97db5d9f79f29647e1f7798c4228514ab1096233bbcbc",
"type": "SchnorrVerification2025"
}
],
"authentication": [
"#key1"
],
"assertionMethod": [
"#key1"
],
"profile": {
"id": "did:nostr:event:b9e51bbb1652ba09f4c01e623aaa8649cf4f79d84731e5c3aca4cb8a15be8723",
"name": "CyberSecCanon",
"about": "We vet #Cybersecurity books. Our reviews are written by real life experts, heroes, and hackers who led through the biggest exploits. www.cybercanon.org",
"picture": "https://media.infosec.exchange/infosec.exchange/accounts/avatars/110/550/422/790/059/634/original/6b0c7fa8e8f9bd64.jpg",
"banner": "https://media.infosec.exchange/infosec.exchange/accounts/headers/110/550/422/790/059/634/original/b42d7f768db43053.jpg",
"nip05": "CyberSecCanon@infosec-exchange.mostr.pub",
"created_at": 1755045476,
"updated_at": "2025-08-13T00:37:56.000Z"
},
"service": [
{
"id": "did:nostr:7597c93ebd9503aaa8b97db5d9f79f29647e1f7798c4228514ab1096233bbcbc#bitcoin-taproot",
"type": "TaprootAddress",
"network": "tbtc4",
"serviceEndpoint": "tb1pwktuj04aj5p6429e0k6anaul99j8u8mhnrzz9pg54vgfvgemhj7q6gmpm2"
},
{
"id": "did:nostr:7597c93ebd9503aaa8b97db5d9f79f29647e1f7798c4228514ab1096233bbcbc#bitcoin-mainnet-taproot",
"type": "TaprootAddress",
"network": "btc",
"serviceEndpoint": "bc1pwktuj04aj5p6429e0k6anaul99j8u8mhnrzz9pg54vgfvgemhj7qdqdwp9"
}
]
}
{
"_id": "689bde64f62442432165feed",
"pubkey": "7597c93ebd9503aaa8b97db5d9f79f29647e1f7798c4228514ab1096233bbcbc",
"content": "{\"name\":\"CyberSecCanon\",\"about\":\"We vet #Cybersecurity books. Our reviews are written by real life experts, heroes, and hackers who led through the biggest exploits. www.cybercanon.org\",\"picture\":\"https://media.infosec.exchange/infosec.exchange/accounts/avatars/110/550/422/790/059/634/original/6b0c7fa8e8f9bd64.jpg\",\"banner\":\"https://media.infosec.exchange/infosec.exchange/accounts/headers/110/550/422/790/059/634/original/b42d7f768db43053.jpg\",\"nip05\":\"CyberSecCanon@infosec-exchange.mostr.pub\",\"fields\":[[\"website\",\"https://cybercanon.org/\"],[\"verification\",\"https://cybercanon.org/\"]]}",
"created_at": 1755045476,
"id": "b9e51bbb1652ba09f4c01e623aaa8649cf4f79d84731e5c3aca4cb8a15be8723",
"kind": 0,
"sig": "12fcd81c0cd7beae0400010cace62d208bdcdf754ecb41057210aadcdc31efeef23ebea91b7e143507b36df8bf38465dbbc7f7db3d61bb50fd5ecdc27b5aab97",
"tags": [
[
"proxy",
"https://infosec.exchange/users/CyberSecCanon",
"activitypub"
],
[
"client",
"Mostr",
"31990:6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9:mostr",
"wss://relay.mostr.pub"
]
],
"updated_at": "2025-08-13T00:37:56.000Z"
}