ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "blurhash": "toot:blurhash", "focalPoint": { "@container": "@list", "@id": "toot:focalPoint" } } ], "id": "https://infosec.exchange/users/pancake/statuses/109868374505037307", "type": "Note", "summary": null, "inReplyTo": "https://infosec.exchange/users/pancake/statuses/109743973096370977", "published": "2023-02-15T10:52:31Z", "url": "https://infosec.exchange/@pancake/109868374505037307", "attributedTo": "https://infosec.exchange/users/pancake", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/pancake/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/pancake/statuses/109868374505037307", "inReplyToAtomUri": "https://infosec.exchange/users/pancake/statuses/109743973096370977", "conversation": "tag:infosec.exchange,2023-01-24:objectId=39647499:objectType=Conversation", "content": "<p>Update on this. Turns out the 55 image doesn&#39;t have the right mtd kernel config to be able to flash the bootloader without the spi cables (which i&#39;m still waiting for them). Buuuut there&#39;s a mini-69 image that can be used to update the firmware via ssh, these are the steps I followed:</p><p>* <a href=\"https://github.com/starfive-tech/VisionFive2/releases/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/starfive-tech/Visio</span><span class=\"invisible\">nFive2/releases/</span></a></p><p>^ download sdcard.img and flash+boot, nmap for the new IP and ssh with &quot;root/starfive&quot; credentials.</p><p>scp is broken and there&#39;s no standard wget or curl working, so you need to download the following files and expose them from your host via http (instead of https)</p><p>* u-boot-spl.bin.normal.out (mtd0)<br />* visionfive2_fw_payload.img (mtd1)</p><p>Run &#39;python -m http.server&#39; on the host side and run &#39;wget&#39; in the board via ssh to pull those files. It&#39;s considered a good practice to check the md5/sha1, but go ahead without that step if you are brave and love bricks.</p><p>After this use the &#39;flashcp&#39; tool from mtd-utils (which is already available in this sdcard.img) and burn the mtd0 and mtd1 devices.</p><p>* flashcp -v u-boot-spl.bin.normal.out /dev/mtd0<br />* flashcp -v visionfive2_fw_payload.img /dev/mtd1</p><p>After these steps you can finally boot the 69 image and get the hdmi video to work again \\o/</p><p>PD: The best way to pull the 69 image is via torrent (the drive and baidu links are slow and have quotas) i&#39;m posting the magnet in a separate toot</p>", "contentMap": { "en": "<p>Update on this. Turns out the 55 image doesn&#39;t have the right mtd kernel config to be able to flash the bootloader without the spi cables (which i&#39;m still waiting for them). Buuuut there&#39;s a mini-69 image that can be used to update the firmware via ssh, these are the steps I followed:</p><p>* <a href=\"https://github.com/starfive-tech/VisionFive2/releases/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">github.com/starfive-tech/Visio</span><span class=\"invisible\">nFive2/releases/</span></a></p><p>^ download sdcard.img and flash+boot, nmap for the new IP and ssh with &quot;root/starfive&quot; credentials.</p><p>scp is broken and there&#39;s no standard wget or curl working, so you need to download the following files and expose them from your host via http (instead of https)</p><p>* u-boot-spl.bin.normal.out (mtd0)<br />* visionfive2_fw_payload.img (mtd1)</p><p>Run &#39;python -m http.server&#39; on the host side and run &#39;wget&#39; in the board via ssh to pull those files. It&#39;s considered a good practice to check the md5/sha1, but go ahead without that step if you are brave and love bricks.</p><p>After this use the &#39;flashcp&#39; tool from mtd-utils (which is already available in this sdcard.img) and burn the mtd0 and mtd1 devices.</p><p>* flashcp -v u-boot-spl.bin.normal.out /dev/mtd0<br />* flashcp -v visionfive2_fw_payload.img /dev/mtd1</p><p>After these steps you can finally boot the 69 image and get the hdmi video to work again \\o/</p><p>PD: The best way to pull the 69 image is via torrent (the drive and baidu links are slow and have quotas) i&#39;m posting the magnet in a separate toot</p>" }, "attachment": [ { "type": "Document", "mediaType": "image/png", "url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/109/868/332/753/834/256/original/4d6f60f2bf383575.png", "name": "wget stuff", "blurhash": "U45X=N~q?bt7WBt7j[WBWBayj[j[RjxuofRj", "focalPoint": [ 0, 0 ], "width": 1934, "height": 286 }, { "type": "Document", "mediaType": "image/png", "url": "https://media.infosec.exchange/infosec.exchange/media_attachments/files/109/868/342/014/314/922/original/6723457d1e1a6a24.png", "name": "burn the spl", "blurhash": "U45hY|~qt7Rjxu%MWBRjt7WBRjofM{M{j[t7", "focalPoint": [ 0, 0 ], "width": 894, "height": 424 } ], "tag": [], "replies": { "id": "https://infosec.exchange/users/pancake/statuses/109868374505037307/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/pancake/statuses/109868374505037307/replies?min_id=109868384104710023&page=true", "partOf": "https://infosec.exchange/users/pancake/statuses/109868374505037307/replies", "items": [ "https://infosec.exchange/users/pancake/statuses/109868384104710023" ] } }, "likes": { "id": "https://infosec.exchange/users/pancake/statuses/109868374505037307/likes", "type": "Collection", "totalItems": 1 }, "shares": { "id": "https://infosec.exchange/users/pancake/statuses/109868374505037307/shares", "type": "Collection", "totalItems": 1 } }