Event JSON
{
"id": "79f10482ea334520bb4b522a2211e5f6cd56e67c49571815f85ecbfeca4b374c",
"pubkey": "da365790bf863f88c720a28f5eb64636df6ab45e905e2f63a5147c7e1c278493",
"created_at": 1757077962,
"kind": 1,
"tags": [
[
"t",
"didkey"
],
[
"t",
"key"
],
[
"t",
"online"
],
[
"t",
"certification"
],
[
"t",
"plsretoot"
],
[
"t",
"askfedi"
],
[
"t",
"onlinesecurity"
],
[
"t",
"question"
],
[
"t",
"itsec"
],
[
"t",
"authentication"
],
[
"t",
"web"
],
[
"proxy",
"https://chaos.social/users/kubikpixel/statuses/115151861337609449",
"activitypub"
],
[
"client",
"Mostr",
"31990:6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9:mostr",
"wss://relay.mostr.pub"
]
],
"content": "Β»DID Method for Natural PersonsΒ«\n\nDoes anyone know about this and are there any post-quantum cryptography approaches available? How widespread is it, and is it already being used extensively? If so, where and by whom in what areas?\n\nI thank you in advance for your answers and the retoot.\n\nπ§βπ» https://hub.ebsi.eu/vc-framework/did/natural-person\n\n#didkey #key #online #certification #plsretoot #askfedi #onlinesecurity #question #itsec #authentication #web",
"sig": "dc94ea5471d87fa64eb9256b7d9bfcceff230184da316558c47f9300ab4c047523d4cf66d733f18f73477768085bf598f74e434714ebf7423ff33e9b0420f730"
}