ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage" } ], "id": "https://infosec.exchange/users/realn2s/statuses/114470402309056399/replies", "type": "Collection", "first": { "id": "https://infosec.exchange/users/realn2s/statuses/114470402309056399/replies?page=true", "type": "CollectionPage", "next": "https://infosec.exchange/users/realn2s/statuses/114470402309056399/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/realn2s/statuses/114470402309056399/replies", "items": [ { "id": "https://infosec.exchange/users/realn2s/statuses/114471946549571141", "type": "Note", "summary": null, "inReplyTo": "https://infosec.exchange/users/realn2s/statuses/114470402309056399", "published": "2025-05-08T11:21:25Z", "url": "https://infosec.exchange/@realn2s/114471946549571141", "attributedTo": "https://infosec.exchange/users/realn2s", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/realn2s/followers", "https://mastodon.nu/users/magjo", "https://chaos.social/users/jaseg", "https://mapstodon.space/users/lnicola" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/realn2s/statuses/114471946549571141", "inReplyToAtomUri": "https://infosec.exchange/users/realn2s/statuses/114470402309056399", "conversation": "tag:infosec.exchange,2025-05-08:objectId=269008947:objectType=Conversation", "content": "<p>As state in edit 2 the whole story is getting more and more abstruse,</p><p>While the Guardian article is from 2025-05-07 and is titled \"Today’s AI can crack second world war Enigma code ‘in short order’, experts say\".</p><p>The event it is based on, happen somewhen in 2017. <br>See <a href=\"https://www.techradar.com/news/we-watched-an-ai-crack-the-enigma-code-in-just-over-ten-minutes\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">techradar.com/news/we-watched-</span><span class=\"invisible\">an-ai-crack-the-enigma-code-in-just-over-ten-minutes</span></a></p><p>An seems to be a marketing stunt from a (now defunct) AI and Machine Learning startup Enigma Pattern and DigitalOcean.</p><p>According to <a href=\"https://www.digitalocean.com/blog/how-2000-droplets-broke-the-enigma-code-in-13-minutes\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">digitalocean.com/blog/how-2000</span><span class=\"invisible\">-droplets-broke-the-enigma-code-in-13-minutes</span></a> they recreate the Nazi navy’s version of the machine in Python. Initially, they tried to teach their AI to decode the Enigma code itself, but it didn’t work. Neither did Lambda functions from Amazon.</p><p>As a next step they trained an algorithm to recognize German by using Grimms Fairy Tales (not AI mentioned here).</p><p>Then they ran the following on 2000 server:<br>Distribute combinations of \"passwords\" to run on the ciphertext. Check if the decoded message sounds like German, and if so, do a more detailed inspection by the AI.</p><p>The 2,000 virtual servers ran through 41 million combinations per second. Leading to roughly 40 billion combinations they tried.</p><p>So, the \"AI\" part was only used to check if the decoded message was plausible German text.<br>The message was “German is a beautiful language”. It would have been interesting to see what would have happened of the message had contained words which weren't in the training corpus (like \"Panzer\", \"U-Boot\", \"Hitler\").</p><p>So basically, it was brute force with a bit of language detection sprinkled in</p><p>Thanks to <span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.nu/@magjo\" class=\"u-url mention\" rel=\"nofollow noopener\" target=\"_blank\">@<span>magjo</span></a></span>, <span class=\"h-card\" translate=\"no\"><a href=\"https://chaos.social/@jaseg\" class=\"u-url mention\" rel=\"nofollow noopener\" target=\"_blank\">@<span>jaseg</span></a></span>, <span class=\"h-card\" translate=\"no\"><a href=\"https://mapstodon.space/@lnicola\" class=\"u-url mention\" rel=\"nofollow noopener\" target=\"_blank\">@<span>lnicola</span></a></span><br> and others for pointing that out</p>", "contentMap": { "en": "<p>As state in edit 2 the whole story is getting more and more abstruse,</p><p>While the Guardian article is from 2025-05-07 and is titled \"Today’s AI can crack second world war Enigma code ‘in short order’, experts say\".</p><p>The event it is based on, happen somewhen in 2017. <br>See <a href=\"https://www.techradar.com/news/we-watched-an-ai-crack-the-enigma-code-in-just-over-ten-minutes\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">techradar.com/news/we-watched-</span><span class=\"invisible\">an-ai-crack-the-enigma-code-in-just-over-ten-minutes</span></a></p><p>An seems to be a marketing stunt from a (now defunct) AI and Machine Learning startup Enigma Pattern and DigitalOcean.</p><p>According to <a href=\"https://www.digitalocean.com/blog/how-2000-droplets-broke-the-enigma-code-in-13-minutes\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">digitalocean.com/blog/how-2000</span><span class=\"invisible\">-droplets-broke-the-enigma-code-in-13-minutes</span></a> they recreate the Nazi navy’s version of the machine in Python. Initially, they tried to teach their AI to decode the Enigma code itself, but it didn’t work. Neither did Lambda functions from Amazon.</p><p>As a next step they trained an algorithm to recognize German by using Grimms Fairy Tales (not AI mentioned here).</p><p>Then they ran the following on 2000 server:<br>Distribute combinations of \"passwords\" to run on the ciphertext. Check if the decoded message sounds like German, and if so, do a more detailed inspection by the AI.</p><p>The 2,000 virtual servers ran through 41 million combinations per second. Leading to roughly 40 billion combinations they tried.</p><p>So, the \"AI\" part was only used to check if the decoded message was plausible German text.<br>The message was “German is a beautiful language”. It would have been interesting to see what would have happened of the message had contained words which weren't in the training corpus (like \"Panzer\", \"U-Boot\", \"Hitler\").</p><p>So basically, it was brute force with a bit of language detection sprinkled in</p><p>Thanks to <span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.nu/@magjo\" class=\"u-url mention\" rel=\"nofollow noopener\" target=\"_blank\">@<span>magjo</span></a></span>, <span class=\"h-card\" translate=\"no\"><a href=\"https://chaos.social/@jaseg\" class=\"u-url mention\" rel=\"nofollow noopener\" target=\"_blank\">@<span>jaseg</span></a></span>, <span class=\"h-card\" translate=\"no\"><a href=\"https://mapstodon.space/@lnicola\" class=\"u-url mention\" rel=\"nofollow noopener\" target=\"_blank\">@<span>lnicola</span></a></span><br> and others for pointing that out</p>" }, "attachment": [], "tag": [ { "type": "Mention", "href": "https://mastodon.nu/users/magjo", "name": "@magjo@mastodon.nu" }, { "type": "Mention", "href": "https://chaos.social/users/jaseg", "name": "@jaseg@chaos.social" }, { "type": "Mention", "href": "https://mapstodon.space/users/lnicola", "name": "@lnicola@mapstodon.space" } ], "replies": { "id": "https://infosec.exchange/users/realn2s/statuses/114471946549571141/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/realn2s/statuses/114471946549571141/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/realn2s/statuses/114471946549571141/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/realn2s/statuses/114471946549571141/likes", "type": "Collection", "totalItems": 7 }, "shares": { "id": "https://infosec.exchange/users/realn2s/statuses/114471946549571141/shares", "type": "Collection", "totalItems": 2 } } ] } }