A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-09-03T20:35:17Z",
"url": "https://infosec.exchange/@monkeyflower/113075533735700420",
"attributedTo": "https://infosec.exchange/users/monkeyflower",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/monkeyflower/followers",
"https://infosec.exchange/users/yubico"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-09-03:objectId=190770867:objectType=Conversation",
"content": "<p>Not great... but if they already have your <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@yubico\" class=\"u-url mention\">@<span>yubico</span></a></span> aren't you already kinda pwned?</p><p>“An attacker could exploit this issue as part of a sophisticated and targeted attack to recover affected private keys,” the advisory confirmed. “The attacker would need physical possession of the YubiKey, Security Key, or YubiHSM, knowledge of the accounts they want to target, and specialized equipment to perform the necessary attack. Depending on the use case, the attacker may also require additional knowledge including username, PIN, account password, or authentication key.”</p><p><a href=\"https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">arstechnica.com/security/2024/</span><span class=\"invisible\">09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/</span></a></p><p><a href=\"https://infosec.exchange/tags/osint\" class=\"mention hashtag\" rel=\"tag\">#<span>osint</span></a> <a href=\"https://infosec.exchange/tags/opsec\" class=\"mention hashtag\" rel=\"tag\">#<span>opsec</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/security\" class=\"mention hashtag\" rel=\"tag\">#<span>security</span></a></p>",
"contentMap": {
"en": "<p>Not great... but if they already have your <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@yubico\" class=\"u-url mention\">@<span>yubico</span></a></span> aren't you already kinda pwned?</p><p>“An attacker could exploit this issue as part of a sophisticated and targeted attack to recover affected private keys,” the advisory confirmed. “The attacker would need physical possession of the YubiKey, Security Key, or YubiHSM, knowledge of the accounts they want to target, and specialized equipment to perform the necessary attack. Depending on the use case, the attacker may also require additional knowledge including username, PIN, account password, or authentication key.”</p><p><a href=\"https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">arstechnica.com/security/2024/</span><span class=\"invisible\">09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/</span></a></p><p><a href=\"https://infosec.exchange/tags/osint\" class=\"mention hashtag\" rel=\"tag\">#<span>osint</span></a> <a href=\"https://infosec.exchange/tags/opsec\" class=\"mention hashtag\" rel=\"tag\">#<span>opsec</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/security\" class=\"mention hashtag\" rel=\"tag\">#<span>security</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Mention",
"href": "https://infosec.exchange/users/yubico",
"name": "@yubico"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/osint",
"name": "#osint"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/opsec",
"name": "#opsec"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/infosec",
"name": "#infosec"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/security",
"name": "#security"
}
],
"replies": {
"id": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420/likes",
"type": "Collection",
"totalItems": 3
},
"shares": {
"id": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420/shares",
"type": "Collection",
"totalItems": 2
}
}