ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "Hashtag": "as:Hashtag" } ], "id": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-09-03T20:35:17Z", "url": "https://infosec.exchange/@monkeyflower/113075533735700420", "attributedTo": "https://infosec.exchange/users/monkeyflower", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/monkeyflower/followers", "https://infosec.exchange/users/yubico" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-09-03:objectId=190770867:objectType=Conversation", "content": "<p>Not great... but if they already have your <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@yubico\" class=\"u-url mention\">@<span>yubico</span></a></span> aren&#39;t you already kinda pwned?</p><p>“An attacker could exploit this issue as part of a sophisticated and targeted attack to recover affected private keys,” the advisory confirmed. “The attacker would need physical possession of the YubiKey, Security Key, or YubiHSM, knowledge of the accounts they want to target, and specialized equipment to perform the necessary attack. Depending on the use case, the attacker may also require additional knowledge including username, PIN, account password, or authentication key.”</p><p><a href=\"https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">arstechnica.com/security/2024/</span><span class=\"invisible\">09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/</span></a></p><p><a href=\"https://infosec.exchange/tags/osint\" class=\"mention hashtag\" rel=\"tag\">#<span>osint</span></a> <a href=\"https://infosec.exchange/tags/opsec\" class=\"mention hashtag\" rel=\"tag\">#<span>opsec</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/security\" class=\"mention hashtag\" rel=\"tag\">#<span>security</span></a></p>", "contentMap": { "en": "<p>Not great... but if they already have your <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@yubico\" class=\"u-url mention\">@<span>yubico</span></a></span> aren&#39;t you already kinda pwned?</p><p>“An attacker could exploit this issue as part of a sophisticated and targeted attack to recover affected private keys,” the advisory confirmed. “The attacker would need physical possession of the YubiKey, Security Key, or YubiHSM, knowledge of the accounts they want to target, and specialized equipment to perform the necessary attack. Depending on the use case, the attacker may also require additional knowledge including username, PIN, account password, or authentication key.”</p><p><a href=\"https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">arstechnica.com/security/2024/</span><span class=\"invisible\">09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/</span></a></p><p><a href=\"https://infosec.exchange/tags/osint\" class=\"mention hashtag\" rel=\"tag\">#<span>osint</span></a> <a href=\"https://infosec.exchange/tags/opsec\" class=\"mention hashtag\" rel=\"tag\">#<span>opsec</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/security\" class=\"mention hashtag\" rel=\"tag\">#<span>security</span></a></p>" }, "attachment": [], "tag": [ { "type": "Mention", "href": "https://infosec.exchange/users/yubico", "name": "@yubico" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/osint", "name": "#osint" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/opsec", "name": "#opsec" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/infosec", "name": "#infosec" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/security", "name": "#security" } ], "replies": { "id": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420/likes", "type": "Collection", "totalItems": 3 }, "shares": { "id": "https://infosec.exchange/users/monkeyflower/statuses/113075533735700420/shares", "type": "Collection", "totalItems": 2 } }