A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage"
}
],
"id": "https://infosec.exchange/users/vanhoefm/statuses/109322726637787606",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2022-11-11T02:07:05Z",
"url": "https://infosec.exchange/@vanhoefm/109322726637787606",
"attributedTo": "https://infosec.exchange/users/vanhoefm",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/vanhoefm/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/vanhoefm/statuses/109322726637787606",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2022-11-11:objectId=20835061:objectType=Conversation",
"content": "<p>Google Pixel lock screen bypass: put your own SIM card in the phone, enter incorrect PIN code three times, enter correct PUK code of the attacker's SIM card, and finally enter new PIN code. Tada, the phone is unlocked! <a href=\"https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">bugs.xdavidhu.me/google/2022/1</span><span class=\"invisible\">1/10/accidental-70k-google-pixel-lock-screen-bypass/</span></a></p>",
"contentMap": {
"en": "<p>Google Pixel lock screen bypass: put your own SIM card in the phone, enter incorrect PIN code three times, enter correct PUK code of the attacker's SIM card, and finally enter new PIN code. Tada, the phone is unlocked! <a href=\"https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">bugs.xdavidhu.me/google/2022/1</span><span class=\"invisible\">1/10/accidental-70k-google-pixel-lock-screen-bypass/</span></a></p>"
},
"attachment": [],
"tag": [],
"replies": {
"id": "https://infosec.exchange/users/vanhoefm/statuses/109322726637787606/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/vanhoefm/statuses/109322726637787606/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/vanhoefm/statuses/109322726637787606/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/vanhoefm/statuses/109322726637787606/likes",
"type": "Collection",
"totalItems": 5
},
"shares": {
"id": "https://infosec.exchange/users/vanhoefm/statuses/109322726637787606/shares",
"type": "Collection",
"totalItems": 5
}
}