ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "Hashtag": "as:Hashtag" } ], "id": "https://mastodon.bida.im/users/redhotcyber/statuses/112052939446727007", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-03-07T06:16:06Z", "url": "https://mastodon.bida.im/@redhotcyber/112052939446727007", "attributedTo": "https://mastodon.bida.im/users/redhotcyber", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://mastodon.bida.im/users/redhotcyber/followers" ], "sensitive": false, "atomUri": "https://mastodon.bida.im/users/redhotcyber/statuses/112052939446727007", "inReplyToAtomUri": null, "conversation": "tag:mastodon.bida.im,2024-03-07:objectId=70522697:objectType=Conversation", "content": "<p>Cosa sono le PsyOps. Alla scoperta della manipolazione mentale nell’era del digitale</p><p>Le <a href=\"https://mastodon.bida.im/tags/operazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>operazioni</span></a> <a href=\"https://mastodon.bida.im/tags/psicologiche\" class=\"mention hashtag\" rel=\"tag\">#<span>psicologiche</span></a>, comunemente note come <a href=\"https://mastodon.bida.im/tags/PsyOps\" class=\"mention hashtag\" rel=\"tag\">#<span>PsyOps</span></a>, costituiscono un <a href=\"https://mastodon.bida.im/tags/elemento\" class=\"mention hashtag\" rel=\"tag\">#<span>elemento</span></a> significativo e spesso poco compreso delle strategie militari e di sicurezza.</p><p>Queste operazioni coinvolgono l’uso di <a href=\"https://mastodon.bida.im/tags/tattiche\" class=\"mention hashtag\" rel=\"tag\">#<span>tattiche</span></a> <a href=\"https://mastodon.bida.im/tags/psicologiche\" class=\"mention hashtag\" rel=\"tag\">#<span>psicologiche</span></a> per <a href=\"https://mastodon.bida.im/tags/influenzare\" class=\"mention hashtag\" rel=\"tag\">#<span>influenzare</span></a> le <a href=\"https://mastodon.bida.im/tags/percezioni\" class=\"mention hashtag\" rel=\"tag\">#<span>percezioni</span></a>, le <a href=\"https://mastodon.bida.im/tags/emozioni\" class=\"mention hashtag\" rel=\"tag\">#<span>emozioni</span></a> e i comportamenti delle <a href=\"https://mastodon.bida.im/tags/persone\" class=\"mention hashtag\" rel=\"tag\">#<span>persone</span></a> al fine di raggiungere obiettivi <a href=\"https://mastodon.bida.im/tags/strategici\" class=\"mention hashtag\" rel=\"tag\">#<span>strategici</span></a> specifici.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/online\" class=\"mention hashtag\" rel=\"tag\">#<span>online</span></a> <a href=\"https://mastodon.bida.im/tags/it\" class=\"mention hashtag\" rel=\"tag\">#<span>it</span></a> <a href=\"https://mastodon.bida.im/tags/web\" class=\"mention hashtag\" rel=\"tag\">#<span>web</span></a> <a href=\"https://mastodon.bida.im/tags/ai\" class=\"mention hashtag\" rel=\"tag\">#<span>ai</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/intelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>intelligence</span></a> <a href=\"https://mastodon.bida.im/tags/intelligenzaartificiale\" class=\"mention hashtag\" rel=\"tag\">#<span>intelligenzaartificiale</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://www.redhotcyber.com/post/cosa-sono-le-psyops-alla-scoperta-della-manipolazione-mentale-nellera-del-digitale/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">redhotcyber.com/post/cosa-sono</span><span class=\"invisible\">-le-psyops-alla-scoperta-della-manipolazione-mentale-nellera-del-digitale/</span></a></p>", "contentMap": { "it": "<p>Cosa sono le PsyOps. Alla scoperta della manipolazione mentale nell’era del digitale</p><p>Le <a href=\"https://mastodon.bida.im/tags/operazioni\" class=\"mention hashtag\" rel=\"tag\">#<span>operazioni</span></a> <a href=\"https://mastodon.bida.im/tags/psicologiche\" class=\"mention hashtag\" rel=\"tag\">#<span>psicologiche</span></a>, comunemente note come <a href=\"https://mastodon.bida.im/tags/PsyOps\" class=\"mention hashtag\" rel=\"tag\">#<span>PsyOps</span></a>, costituiscono un <a href=\"https://mastodon.bida.im/tags/elemento\" class=\"mention hashtag\" rel=\"tag\">#<span>elemento</span></a> significativo e spesso poco compreso delle strategie militari e di sicurezza.</p><p>Queste operazioni coinvolgono l’uso di <a href=\"https://mastodon.bida.im/tags/tattiche\" class=\"mention hashtag\" rel=\"tag\">#<span>tattiche</span></a> <a href=\"https://mastodon.bida.im/tags/psicologiche\" class=\"mention hashtag\" rel=\"tag\">#<span>psicologiche</span></a> per <a href=\"https://mastodon.bida.im/tags/influenzare\" class=\"mention hashtag\" rel=\"tag\">#<span>influenzare</span></a> le <a href=\"https://mastodon.bida.im/tags/percezioni\" class=\"mention hashtag\" rel=\"tag\">#<span>percezioni</span></a>, le <a href=\"https://mastodon.bida.im/tags/emozioni\" class=\"mention hashtag\" rel=\"tag\">#<span>emozioni</span></a> e i comportamenti delle <a href=\"https://mastodon.bida.im/tags/persone\" class=\"mention hashtag\" rel=\"tag\">#<span>persone</span></a> al fine di raggiungere obiettivi <a href=\"https://mastodon.bida.im/tags/strategici\" class=\"mention hashtag\" rel=\"tag\">#<span>strategici</span></a> specifici.</p><p><a href=\"https://mastodon.bida.im/tags/redhotcyber\" class=\"mention hashtag\" rel=\"tag\">#<span>redhotcyber</span></a> <a href=\"https://mastodon.bida.im/tags/online\" class=\"mention hashtag\" rel=\"tag\">#<span>online</span></a> <a href=\"https://mastodon.bida.im/tags/it\" class=\"mention hashtag\" rel=\"tag\">#<span>it</span></a> <a href=\"https://mastodon.bida.im/tags/web\" class=\"mention hashtag\" rel=\"tag\">#<span>web</span></a> <a href=\"https://mastodon.bida.im/tags/ai\" class=\"mention hashtag\" rel=\"tag\">#<span>ai</span></a> <a href=\"https://mastodon.bida.im/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://mastodon.bida.im/tags/privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>privacy</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://mastodon.bida.im/tags/cybercrime\" class=\"mention hashtag\" rel=\"tag\">#<span>cybercrime</span></a> <a href=\"https://mastodon.bida.im/tags/intelligence\" class=\"mention hashtag\" rel=\"tag\">#<span>intelligence</span></a> <a href=\"https://mastodon.bida.im/tags/intelligenzaartificiale\" class=\"mention hashtag\" rel=\"tag\">#<span>intelligenzaartificiale</span></a> <a href=\"https://mastodon.bida.im/tags/informationsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>informationsecurity</span></a> <a href=\"https://mastodon.bida.im/tags/ethicalhacking\" class=\"mention hashtag\" rel=\"tag\">#<span>ethicalhacking</span></a> <a href=\"https://mastodon.bida.im/tags/dataprotection\" class=\"mention hashtag\" rel=\"tag\">#<span>dataprotection</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecurityawareness\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurityawareness</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritytraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritytraining</span></a> <a href=\"https://mastodon.bida.im/tags/cybersecuritynews\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecuritynews</span></a> <a href=\"https://mastodon.bida.im/tags/infosecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>infosecurity</span></a></p><p><a href=\"https://www.redhotcyber.com/post/cosa-sono-le-psyops-alla-scoperta-della-manipolazione-mentale-nellera-del-digitale/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">redhotcyber.com/post/cosa-sono</span><span class=\"invisible\">-le-psyops-alla-scoperta-della-manipolazione-mentale-nellera-del-digitale/</span></a></p>" }, "attachment": [], "tag": [ { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/operazioni", "name": "#operazioni" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/psicologiche", "name": "#psicologiche" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/psyops", "name": "#psyops" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/elemento", "name": "#elemento" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/tattiche", "name": "#tattiche" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/influenzare", "name": "#influenzare" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/percezioni", "name": "#percezioni" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/emozioni", "name": "#emozioni" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/persone", "name": "#persone" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/strategici", "name": "#strategici" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/redhotcyber", "name": "#redhotcyber" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/online", "name": "#online" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/it", "name": "#it" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/web", "name": "#web" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ai", "name": "#ai" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybercrime", "name": "#cybercrime" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/intelligence", "name": "#intelligence" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/intelligenzaartificiale", "name": "#intelligenzaartificiale" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/informationsecurity", "name": "#informationsecurity" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/ethicalhacking", "name": "#ethicalhacking" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityAwareness", "name": "#CyberSecurityAwareness" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/cybersecuritytraining", "name": "#cybersecuritytraining" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/CyberSecurityNews", "name": "#CyberSecurityNews" }, { "type": "Hashtag", "href": "https://mastodon.bida.im/tags/infosecurity", "name": "#infosecurity" } ], "replies": { "id": "https://mastodon.bida.im/users/redhotcyber/statuses/112052939446727007/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://mastodon.bida.im/users/redhotcyber/statuses/112052939446727007/replies?only_other_accounts=true&page=true", "partOf": "https://mastodon.bida.im/users/redhotcyber/statuses/112052939446727007/replies", "items": [] } } }