A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"blurhash": "toot:blurhash",
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
},
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/wade/statuses/113516092834155016",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-11-20T15:55:15Z",
"url": "https://infosec.exchange/@wade/113516092834155016",
"attributedTo": "https://infosec.exchange/users/wade",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/wade/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/wade/statuses/113516092834155016",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-11-20:objectId=214949185:objectType=Conversation",
"content": "<p>I'm fascinated by the concept of measuring attacker-defender advantage in software, devices, and even entire IT environments. What do I mean by "attacker-defender advantage?" Lemme sum up and then share a chart.</p><p>Let's say you could measure the speed at which defenders remediate various types of security vulnerabilities across all relevant assets. Then say you could detect and measure the speed at which attackers find/exploit those vulnerable assets across the target population of organizations using them. Finally, plot those curves (across time and assets) to see the delta between them and derive a measure of relative advantage for attackers and defenders. That relative value is what I mean by attacker-defender advantage. </p><p>Since a picture is worth a thousand words, here's a visual example of the concept. The blue line represents defenders, measuring the speed of remediation. Red measures how attacker exploitation activity spreads across the target population. When the blue line is on top, defenders have a relative advantage (remediating faster than attackers are attempting to exploit new targets). When red's on top, the opposite is true. The delta between the lines corresponds to the relative degree of advantage (also expressed by the number in the upper left).</p><p>This chart comes from prior Cyentia Institute research in which we were able to combine datasets from two different partners (with their permission). Unfortunately, those datasets/partners are no longer available to further explore this concept - but maybe this post will inspire new partnerships and opportunities!</p><p>Any surprises in the attacker-defender advantage results depicted in the chart? Has anyone measured this or something similar?</p><p><a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/vulnerabilities\" class=\"mention hashtag\" rel=\"tag\">#<span>vulnerabilities</span></a> <a href=\"https://infosec.exchange/tags/cyberattacks\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberattacks</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/exploitation\" class=\"mention hashtag\" rel=\"tag\">#<span>exploitation</span></a></p>",
"contentMap": {
"en": "<p>I'm fascinated by the concept of measuring attacker-defender advantage in software, devices, and even entire IT environments. What do I mean by "attacker-defender advantage?" Lemme sum up and then share a chart.</p><p>Let's say you could measure the speed at which defenders remediate various types of security vulnerabilities across all relevant assets. Then say you could detect and measure the speed at which attackers find/exploit those vulnerable assets across the target population of organizations using them. Finally, plot those curves (across time and assets) to see the delta between them and derive a measure of relative advantage for attackers and defenders. That relative value is what I mean by attacker-defender advantage. </p><p>Since a picture is worth a thousand words, here's a visual example of the concept. The blue line represents defenders, measuring the speed of remediation. Red measures how attacker exploitation activity spreads across the target population. When the blue line is on top, defenders have a relative advantage (remediating faster than attackers are attempting to exploit new targets). When red's on top, the opposite is true. The delta between the lines corresponds to the relative degree of advantage (also expressed by the number in the upper left).</p><p>This chart comes from prior Cyentia Institute research in which we were able to combine datasets from two different partners (with their permission). Unfortunately, those datasets/partners are no longer available to further explore this concept - but maybe this post will inspire new partnerships and opportunities!</p><p>Any surprises in the attacker-defender advantage results depicted in the chart? Has anyone measured this or something similar?</p><p><a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/vulnerabilities\" class=\"mention hashtag\" rel=\"tag\">#<span>vulnerabilities</span></a> <a href=\"https://infosec.exchange/tags/cyberattacks\" class=\"mention hashtag\" rel=\"tag\">#<span>cyberattacks</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/exploitation\" class=\"mention hashtag\" rel=\"tag\">#<span>exploitation</span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/png",
"url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/516/092/496/764/298/original/b192b5542662d394.png",
"name": null,
"blurhash": "U1Ss1[x]_3tR-qRj9Ft7tk%M?bof-;fkIUxu",
"width": 1353,
"height": 1532
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/vulnerabilities",
"name": "#vulnerabilities"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cyberattacks",
"name": "#cyberattacks"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/infosec",
"name": "#infosec"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/exploitation",
"name": "#exploitation"
}
],
"replies": {
"id": "https://infosec.exchange/users/wade/statuses/113516092834155016/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/wade/statuses/113516092834155016/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/wade/statuses/113516092834155016/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/wade/statuses/113516092834155016/likes",
"type": "Collection",
"totalItems": 85
},
"shares": {
"id": "https://infosec.exchange/users/wade/statuses/113516092834155016/shares",
"type": "Collection",
"totalItems": 87
}
}