Oddbean new post about | logout
 furthermore, when you e-tag a NIP-33 you could publish the NIP-33 you're tagging to your own relay and then prove that the pubkey that published it was maliciously altering content

I think changing a NIP-33 maliciously like this is much more a cryptographically-sound self-own rather than a problem for people tagging it.