A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage"
}
],
"id": "https://infosec.exchange/users/briankrebs/statuses/112197571739687377",
"type": "Note",
"summary": null,
"inReplyTo": "https://infosec.exchange/users/briankrebs/statuses/112197305365490518",
"published": "2024-04-01T19:18:00Z",
"url": "https://infosec.exchange/@briankrebs/112197571739687377",
"attributedTo": "https://infosec.exchange/users/briankrebs",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/briankrebs/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/briankrebs/statuses/112197571739687377",
"inReplyToAtomUri": "https://infosec.exchange/users/briankrebs/statuses/112197305365490518",
"conversation": "tag:infosec.exchange,2024-04-01:objectId=147025048:objectType=Conversation",
"content": "<p>Sometimes you get gems from LinkedIn:</p><p>From Chris Wysopal:<br /><a href=\"https://www.linkedin.com/in/wysopal/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"\">linkedin.com/in/wysopal/</span><span class=\"invisible\"></span></a></p><p>"It would be interesting to run this analysis across all open source committers. I'm keen to understand if we can root out other backdoors by detecting signals like these learned from the XZ backdoor incident."</p><p>THIS!</p>",
"contentMap": {
"en": "<p>Sometimes you get gems from LinkedIn:</p><p>From Chris Wysopal:<br /><a href=\"https://www.linkedin.com/in/wysopal/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"\">linkedin.com/in/wysopal/</span><span class=\"invisible\"></span></a></p><p>"It would be interesting to run this analysis across all open source committers. I'm keen to understand if we can root out other backdoors by detecting signals like these learned from the XZ backdoor incident."</p><p>THIS!</p>"
},
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/briankrebs/statuses/112197571739687377/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/briankrebs/statuses/112197571739687377/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/briankrebs/statuses/112197571739687377/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/briankrebs/statuses/112197571739687377/likes",
"type": "Collection",
"totalItems": 302
},
"shares": {
"id": "https://infosec.exchange/users/briankrebs/statuses/112197571739687377/shares",
"type": "Collection",
"totalItems": 88
}
}