A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"blurhash": "toot:blurhash",
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
},
"Hashtag": "as:Hashtag"
}
],
"id": "https://mastodon.social/users/appassionato/statuses/114634940515580025",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2025-06-06T06:12:56Z",
"url": "https://mastodon.social/@appassionato/114634940515580025",
"attributedTo": "https://mastodon.social/users/appassionato",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.social/users/appassionato/followers",
"https://a.gup.pe/u/bookstodon",
"https://a.gup.pe/u/bookstodon/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.social/users/appassionato/statuses/114634940515580025",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.social,2025-06-06:objectId=1015830784:objectType=Conversation",
"content": "<p>Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems by Edward Griffor (2017) presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. </p><p><a href=\"https://www.sciencedirect.com/book/9780128037737/handbook-of-system-safety-and-security\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">sciencedirect.com/book/9780128</span><span class=\"invisible\">037737/handbook-of-system-safety-and-security</span></a></p><p><span class=\"h-card\" translate=\"no\"><a href=\"https://a.gup.pe/u/bookstodon\" class=\"u-url mention\">@<span>bookstodon</span></a></span> <br /><a href=\"https://mastodon.social/tags/books\" class=\"mention hashtag\" rel=\"tag\">#<span>books</span></a> <br /><a href=\"https://mastodon.social/tags/nonfiction\" class=\"mention hashtag\" rel=\"tag\">#<span>nonfiction</span></a> <br /><a href=\"https://mastodon.social/tags/computers\" class=\"mention hashtag\" rel=\"tag\">#<span>computers</span></a> <br /><a href=\"https://mastodon.social/tags/safety\" class=\"mention hashtag\" rel=\"tag\">#<span>safety</span></a> <br /><a href=\"https://mastodon.social/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <br /><a href=\"https://mastodon.social/tags/IoT\" class=\"mention hashtag\" rel=\"tag\">#<span>IoT</span></a></p>",
"contentMap": {
"en": "<p>Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems by Edward Griffor (2017) presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. </p><p><a href=\"https://www.sciencedirect.com/book/9780128037737/handbook-of-system-safety-and-security\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">sciencedirect.com/book/9780128</span><span class=\"invisible\">037737/handbook-of-system-safety-and-security</span></a></p><p><span class=\"h-card\" translate=\"no\"><a href=\"https://a.gup.pe/u/bookstodon\" class=\"u-url mention\">@<span>bookstodon</span></a></span> <br /><a href=\"https://mastodon.social/tags/books\" class=\"mention hashtag\" rel=\"tag\">#<span>books</span></a> <br /><a href=\"https://mastodon.social/tags/nonfiction\" class=\"mention hashtag\" rel=\"tag\">#<span>nonfiction</span></a> <br /><a href=\"https://mastodon.social/tags/computers\" class=\"mention hashtag\" rel=\"tag\">#<span>computers</span></a> <br /><a href=\"https://mastodon.social/tags/safety\" class=\"mention hashtag\" rel=\"tag\">#<span>safety</span></a> <br /><a href=\"https://mastodon.social/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <br /><a href=\"https://mastodon.social/tags/IoT\" class=\"mention hashtag\" rel=\"tag\">#<span>IoT</span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/jpeg",
"url": "https://files.mastodon.social/media_attachments/files/114/634/938/351/476/159/original/af4ad180ab65d6cc.jpg",
"name": "Key Features\n\n Presents the most current and leading edge research on system safety and security, featuring a panel of top experts in the field\n Includes several research advancements published for the first time, including the use of ‘goal structured notation’ together with a ‘judgment calculus’ and their automation as a ‘rule set’ to facilitate systems safety and systems security process execution in compliance with existing standards\n Presents for the first time the latest research in the field with the unique perspective that systems safety and systems security are inextricably intertwined\n Includes coverage of systems architecture, cyber physical systems, tradeoffs between safety, security, and performance, as well as the current methodologies and technologies and implantation practices for system safety and security\n",
"blurhash": "UO6]O+ZLx]i{xGxunOoerCx]nioexGnOt7ae",
"focalPoint": [
0,
0
],
"width": 342,
"height": 444
}
],
"tag": [
{
"type": "Mention",
"href": "https://a.gup.pe/u/bookstodon",
"name": "@bookstodon@a.gup.pe"
},
{
"type": "Hashtag",
"href": "https://mastodon.social/tags/books",
"name": "#books"
},
{
"type": "Hashtag",
"href": "https://mastodon.social/tags/nonfiction",
"name": "#nonfiction"
},
{
"type": "Hashtag",
"href": "https://mastodon.social/tags/computers",
"name": "#computers"
},
{
"type": "Hashtag",
"href": "https://mastodon.social/tags/safety",
"name": "#safety"
},
{
"type": "Hashtag",
"href": "https://mastodon.social/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://mastodon.social/tags/iot",
"name": "#iot"
}
],
"replies": {
"id": "https://mastodon.social/users/appassionato/statuses/114634940515580025/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.social/users/appassionato/statuses/114634940515580025/replies?min_id=114634959248962640&page=true",
"partOf": "https://mastodon.social/users/appassionato/statuses/114634940515580025/replies",
"items": [
"https://mastodon.social/users/appassionato/statuses/114634959248962640"
]
}
},
"likes": {
"id": "https://mastodon.social/users/appassionato/statuses/114634940515580025/likes",
"type": "Collection",
"totalItems": 1
},
"shares": {
"id": "https://mastodon.social/users/appassionato/statuses/114634940515580025/shares",
"type": "Collection",
"totalItems": 3
}
}