A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"blurhash": "toot:blurhash",
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
},
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/ErikvanStraten/statuses/114227977082449887",
"type": "Note",
"summary": null,
"inReplyTo": "https://mastodon.ar.al/users/aral/statuses/114224434946164202",
"published": "2025-03-26T09:16:47Z",
"url": "https://infosec.exchange/@ErikvanStraten/114227977082449887",
"attributedTo": "https://infosec.exchange/users/ErikvanStraten",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/ErikvanStraten/followers",
"https://mastodon.ar.al/users/aral",
"https://ec.social-network.europa.eu/users/EUCommission",
"https://infosec.exchange/users/letsencrypt",
"https://social.nlnet.nl/users/nlnet"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/ErikvanStraten/statuses/114227977082449887",
"inReplyToAtomUri": "https://mastodon.ar.al/users/aral/statuses/114224434946164202",
"conversation": "tag:mastodon.ar.al,2025-03-25:objectId=51443723:objectType=Conversation",
"content": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.ar.al/@aral\" class=\"u-url mention\">@<span>aral</span></a></span> : most Let's Encrypt (and other Domain Validated) certificates are issued to junk- or plain criminal websites.</p><p>They're the ultimate manifestation of evil big tech.</p><p>They were introduced to encrypt the "last mile" because Internet Service Providers were replacing ads in webpages and, in the other direction, inserting fake clicks.</p><p>DV has destroyed the internet. People loose their ebank savings and companies get ransomwared; phishing is dead simple. EDIW/EUDIW will become an identity fraud disaster (because of AitM phishing atracks).</p><p>Even the name "Let's Encrypt" is wrong for a CSP: nobody needs a certificate to encrypt a connection. The primary purpose of a certificate is AUTHENTICATION (of the owner of the private key, in this case the website).</p><p>However, for human beings, just a domain name simply does not provide reliable identification information. It renders impersonation a peace of cake.</p><p>Decent online authentication is HARD. Get used to it instead of denying it.</p><p>REASONS/EXAMPLES</p><p>🔹 Troy Hunt fell in the DV trap: <a href=\"https://infosec.exchange/@ErikvanStraten/114222237036021070\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@ErikvanStrat</span><span class=\"invisible\">en/114222237036021070</span></a></p><p>🔹 Google (and Troy Hunt!) killed non-DV certs (for profit) because of the stripe.com PoC. Now Chrome does not give you any more info than what Google argumented: <a href=\"https://infosec.exchange/@ErikvanStraten/114224682101772569\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@ErikvanStrat</span><span class=\"invisible\">en/114224682101772569</span></a></p><p>🔹 https:⧸⧸cancel-google.com/captcha was live yesterday: <a href=\"https://infosec.exchange/@ErikvanStraten/114224264440704546\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@ErikvanStrat</span><span class=\"invisible\">en/114224264440704546</span></a></p><p>🔹 Stop phishing proposal: <a href=\"https://infosec.exchange/@ErikvanStraten/113079966331873386\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@ErikvanStrat</span><span class=\"invisible\">en/113079966331873386</span></a></p><p>🔹 Lots of reasons why LE sucks:<br /><a href=\"https://infosec.exchange/@ErikvanStraten/112914047006977222\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@ErikvanStrat</span><span class=\"invisible\">en/112914047006977222</span></a> (corrected link 09:20 UTC)</p><p>🔹 This website stopped registering junk .bond domain names, probably because there were too many every day (the last page I found): <a href=\"https://newly-registered-domains.abtdomain.com/2024-08-15-bond-newly-registered-domains-part-1/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">newly-registered-domains.abtdo</span><span class=\"invisible\">main.com/2024-08-15-bond-newly-registered-domains-part-1/</span></a>. However, this gang is still active, open the RELATIONS tab in <a href=\"https://www.virustotal.com/gui/ip-address/13.248.197.209/relations\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">virustotal.com/gui/ip-address/</span><span class=\"invisible\">13.248.197.209/relations</span></a>. You have to multiply the number of LE certs by approx. 5 because they also register subdomains and don't use wildcard certs. Source: <a href=\"https://www.bleepingcomputer.com/news/security/revolver-rabbit-gang-registers-500-000-domains-for-malware-campaigns/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">bleepingcomputer.com/news/secu</span><span class=\"invisible\">rity/revolver-rabbit-gang-registers-500-000-domains-for-malware-campaigns/</span></a></p><p><span class=\"h-card\" translate=\"no\"><a href=\"https://ec.social-network.europa.eu/@EUCommission\" class=\"u-url mention\">@<span>EUCommission</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@letsencrypt\" class=\"u-url mention\">@<span>letsencrypt</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://social.nlnet.nl/@nlnet\" class=\"u-url mention\">@<span>nlnet</span></a></span> </p><p><a href=\"https://infosec.exchange/tags/Authentication\" class=\"mention hashtag\" rel=\"tag\">#<span>Authentication</span></a> <a href=\"https://infosec.exchange/tags/Impersonation\" class=\"mention hashtag\" rel=\"tag\">#<span>Impersonation</span></a> <a href=\"https://infosec.exchange/tags/Spoofing\" class=\"mention hashtag\" rel=\"tag\">#<span>Spoofing</span></a> <a href=\"https://infosec.exchange/tags/Phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>Phishing</span></a> <a href=\"https://infosec.exchange/tags/DV\" class=\"mention hashtag\" rel=\"tag\">#<span>DV</span></a> <a href=\"https://infosec.exchange/tags/GoogleIsEvil\" class=\"mention hashtag\" rel=\"tag\">#<span>GoogleIsEvil</span></a> <a href=\"https://infosec.exchange/tags/BigTechIsEvil\" class=\"mention hashtag\" rel=\"tag\">#<span>BigTechIsEvil</span></a> <a href=\"https://infosec.exchange/tags/Certificates\" class=\"mention hashtag\" rel=\"tag\">#<span>Certificates</span></a> <a href=\"https://infosec.exchange/tags/httpsVShttp\" class=\"mention hashtag\" rel=\"tag\">#<span>httpsVShttp</span></a> <a href=\"https://infosec.exchange/tags/AitM\" class=\"mention hashtag\" rel=\"tag\">#<span>AitM</span></a> <a href=\"https://infosec.exchange/tags/MitM\" class=\"mention hashtag\" rel=\"tag\">#<span>MitM</span></a> <a href=\"https://infosec.exchange/tags/FakeWebsites\" class=\"mention hashtag\" rel=\"tag\">#<span>FakeWebsites</span></a> <a href=\"https://infosec.exchange/tags/CloudflareIsEvil\" class=\"mention hashtag\" rel=\"tag\">#<span>CloudflareIsEvil</span></a> <a href=\"https://infosec.exchange/tags/bond\" class=\"mention hashtag\" rel=\"tag\">#<span>bond</span></a> <a href=\"https://infosec.exchange/tags/dotBond\" class=\"mention hashtag\" rel=\"tag\">#<span>dotBond</span></a> <a href=\"https://infosec.exchange/tags/Spam\" class=\"mention hashtag\" rel=\"tag\">#<span>Spam</span></a> <a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/Ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>Ransomware</span></a> <a href=\"https://infosec.exchange/tags/Banks\" class=\"mention hashtag\" rel=\"tag\">#<span>Banks</span></a> <a href=\"https://infosec.exchange/tags/CloudflareIsEvil\" class=\"mention hashtag\" rel=\"tag\">#<span>CloudflareIsEvil</span></a> <a href=\"https://infosec.exchange/tags/FakeWebsites\" class=\"mention hashtag\" rel=\"tag\">#<span>FakeWebsites</span></a></p>",
"contentMap": {
"en": "<p><span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.ar.al/@aral\" class=\"u-url mention\">@<span>aral</span></a></span> : most Let's Encrypt (and other Domain Validated) certificates are issued to junk- or plain criminal websites.</p><p>They're the ultimate manifestation of evil big tech.</p><p>They were introduced to encrypt the "last mile" because Internet Service Providers were replacing ads in webpages and, in the other direction, inserting fake clicks.</p><p>DV has destroyed the internet. People loose their ebank savings and companies get ransomwared; phishing is dead simple. EDIW/EUDIW will become an identity fraud disaster (because of AitM phishing atracks).</p><p>Even the name "Let's Encrypt" is wrong for a CSP: nobody needs a certificate to encrypt a connection. The primary purpose of a certificate is AUTHENTICATION (of the owner of the private key, in this case the website).</p><p>However, for human beings, just a domain name simply does not provide reliable identification information. It renders impersonation a peace of cake.</p><p>Decent online authentication is HARD. Get used to it instead of denying it.</p><p>REASONS/EXAMPLES</p><p>🔹 Troy Hunt fell in the DV trap: <a href=\"https://infosec.exchange/@ErikvanStraten/114222237036021070\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@ErikvanStrat</span><span class=\"invisible\">en/114222237036021070</span></a></p><p>🔹 Google (and Troy Hunt!) killed non-DV certs (for profit) because of the stripe.com PoC. Now Chrome does not give you any more info than what Google argumented: <a href=\"https://infosec.exchange/@ErikvanStraten/114224682101772569\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@ErikvanStrat</span><span class=\"invisible\">en/114224682101772569</span></a></p><p>🔹 https:⧸⧸cancel-google.com/captcha was live yesterday: <a href=\"https://infosec.exchange/@ErikvanStraten/114224264440704546\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@ErikvanStrat</span><span class=\"invisible\">en/114224264440704546</span></a></p><p>🔹 Stop phishing proposal: <a href=\"https://infosec.exchange/@ErikvanStraten/113079966331873386\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@ErikvanStrat</span><span class=\"invisible\">en/113079966331873386</span></a></p><p>🔹 Lots of reasons why LE sucks:<br /><a href=\"https://infosec.exchange/@ErikvanStraten/112914047006977222\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@ErikvanStrat</span><span class=\"invisible\">en/112914047006977222</span></a> (corrected link 09:20 UTC)</p><p>🔹 This website stopped registering junk .bond domain names, probably because there were too many every day (the last page I found): <a href=\"https://newly-registered-domains.abtdomain.com/2024-08-15-bond-newly-registered-domains-part-1/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">newly-registered-domains.abtdo</span><span class=\"invisible\">main.com/2024-08-15-bond-newly-registered-domains-part-1/</span></a>. However, this gang is still active, open the RELATIONS tab in <a href=\"https://www.virustotal.com/gui/ip-address/13.248.197.209/relations\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">virustotal.com/gui/ip-address/</span><span class=\"invisible\">13.248.197.209/relations</span></a>. You have to multiply the number of LE certs by approx. 5 because they also register subdomains and don't use wildcard certs. Source: <a href=\"https://www.bleepingcomputer.com/news/security/revolver-rabbit-gang-registers-500-000-domains-for-malware-campaigns/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">bleepingcomputer.com/news/secu</span><span class=\"invisible\">rity/revolver-rabbit-gang-registers-500-000-domains-for-malware-campaigns/</span></a></p><p><span class=\"h-card\" translate=\"no\"><a href=\"https://ec.social-network.europa.eu/@EUCommission\" class=\"u-url mention\">@<span>EUCommission</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@letsencrypt\" class=\"u-url mention\">@<span>letsencrypt</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://social.nlnet.nl/@nlnet\" class=\"u-url mention\">@<span>nlnet</span></a></span> </p><p><a href=\"https://infosec.exchange/tags/Authentication\" class=\"mention hashtag\" rel=\"tag\">#<span>Authentication</span></a> <a href=\"https://infosec.exchange/tags/Impersonation\" class=\"mention hashtag\" rel=\"tag\">#<span>Impersonation</span></a> <a href=\"https://infosec.exchange/tags/Spoofing\" class=\"mention hashtag\" rel=\"tag\">#<span>Spoofing</span></a> <a href=\"https://infosec.exchange/tags/Phishing\" class=\"mention hashtag\" rel=\"tag\">#<span>Phishing</span></a> <a href=\"https://infosec.exchange/tags/DV\" class=\"mention hashtag\" rel=\"tag\">#<span>DV</span></a> <a href=\"https://infosec.exchange/tags/GoogleIsEvil\" class=\"mention hashtag\" rel=\"tag\">#<span>GoogleIsEvil</span></a> <a href=\"https://infosec.exchange/tags/BigTechIsEvil\" class=\"mention hashtag\" rel=\"tag\">#<span>BigTechIsEvil</span></a> <a href=\"https://infosec.exchange/tags/Certificates\" class=\"mention hashtag\" rel=\"tag\">#<span>Certificates</span></a> <a href=\"https://infosec.exchange/tags/httpsVShttp\" class=\"mention hashtag\" rel=\"tag\">#<span>httpsVShttp</span></a> <a href=\"https://infosec.exchange/tags/AitM\" class=\"mention hashtag\" rel=\"tag\">#<span>AitM</span></a> <a href=\"https://infosec.exchange/tags/MitM\" class=\"mention hashtag\" rel=\"tag\">#<span>MitM</span></a> <a href=\"https://infosec.exchange/tags/FakeWebsites\" class=\"mention hashtag\" rel=\"tag\">#<span>FakeWebsites</span></a> <a href=\"https://infosec.exchange/tags/CloudflareIsEvil\" class=\"mention hashtag\" rel=\"tag\">#<span>CloudflareIsEvil</span></a> <a href=\"https://infosec.exchange/tags/bond\" class=\"mention hashtag\" rel=\"tag\">#<span>bond</span></a> <a href=\"https://infosec.exchange/tags/dotBond\" class=\"mention hashtag\" rel=\"tag\">#<span>dotBond</span></a> <a href=\"https://infosec.exchange/tags/Spam\" class=\"mention hashtag\" rel=\"tag\">#<span>Spam</span></a> <a href=\"https://infosec.exchange/tags/Infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>Infosec</span></a> <a href=\"https://infosec.exchange/tags/Ransomware\" class=\"mention hashtag\" rel=\"tag\">#<span>Ransomware</span></a> <a href=\"https://infosec.exchange/tags/Banks\" class=\"mention hashtag\" rel=\"tag\">#<span>Banks</span></a> <a href=\"https://infosec.exchange/tags/CloudflareIsEvil\" class=\"mention hashtag\" rel=\"tag\">#<span>CloudflareIsEvil</span></a> <a href=\"https://infosec.exchange/tags/FakeWebsites\" class=\"mention hashtag\" rel=\"tag\">#<span>FakeWebsites</span></a></p>"
},
"updated": "2025-03-26T09:22:04Z",
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/227/953/492/033/687/original/b0a8332c92218b8a.jpeg",
"name": "Screenshot from the top of https://www.virustotal.com/gui/ip-address/13.248.197.209/relations\n\nThe page had already redreshed when I copied the following domain names, so this is just to get an idea:\n\ntiles-35312.bond\nsleepwear-14660.bond\nprostate-cancer-treatment-95682.bond\ndiet-98948.bond\nelectric-cars-94009.bond\npacking-jobs-44721.bond\ndental-implants-48408.bond\nmattress-19892.bond\nbreast-reduction-mammoplasty-surgery-24489.bond\ndental-implants-76071.bond\nrv-camper-motorhomes-90728.bond\nroofing-services-61345.bond\nmaid-service-26172.bond\n",
"blurhash": "U7S6V%NF?aWB0gRjt6t7wIt7R*WB=Et7WXWB",
"focalPoint": [
-0.14,
1
],
"width": 707,
"height": 1366
}
],
"tag": [
{
"type": "Mention",
"href": "https://mastodon.ar.al/users/aral",
"name": "@aral@mastodon.ar.al"
},
{
"type": "Mention",
"href": "https://ec.social-network.europa.eu/users/EUCommission",
"name": "@EUCommission@ec.social-network.europa.eu"
},
{
"type": "Mention",
"href": "https://infosec.exchange/users/letsencrypt",
"name": "@letsencrypt"
},
{
"type": "Mention",
"href": "https://social.nlnet.nl/users/nlnet",
"name": "@nlnet@nlnet.nl"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/authentication",
"name": "#authentication"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/impersonation",
"name": "#impersonation"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/spoofing",
"name": "#spoofing"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/phishing",
"name": "#phishing"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/dv",
"name": "#dv"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/googleisevil",
"name": "#googleisevil"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/bigtechisevil",
"name": "#bigtechisevil"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/certificates",
"name": "#certificates"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/httpsvshttp",
"name": "#httpsvshttp"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/AiTM",
"name": "#AiTM"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/mitm",
"name": "#mitm"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/fakewebsites",
"name": "#fakewebsites"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cloudflareisevil",
"name": "#cloudflareisevil"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/bond",
"name": "#bond"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/dotbond",
"name": "#dotbond"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/spam",
"name": "#spam"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/infosec",
"name": "#infosec"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/ransomware",
"name": "#ransomware"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/banks",
"name": "#banks"
}
],
"replies": {
"id": "https://infosec.exchange/users/ErikvanStraten/statuses/114227977082449887/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/ErikvanStraten/statuses/114227977082449887/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/ErikvanStraten/statuses/114227977082449887/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/ErikvanStraten/statuses/114227977082449887/likes",
"type": "Collection",
"totalItems": 4
},
"shares": {
"id": "https://infosec.exchange/users/ErikvanStraten/statuses/114227977082449887/shares",
"type": "Collection",
"totalItems": 3
}
}