encoder script for swarm feeds content update.
call the script with comma-separated hex prefixes as its only argument.
if your pinner addresses have the following prefixes:
3978
d19c
9c26
then run:
go run encode.go "3978,d19c,9c26"
which will result in:
5b224f58673d222c22305a773d222c226e43593d225d
this resulting hex string should be posted to the recovery feed as its content so that the swarm client correctly derives the trojan targets.
for instructions on how to submit content to a feed, please refer to the official swarm documentation.