ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "expiry": "toot:expiry", "Hashtag": "as:Hashtag" } ], "id": "https://qoto.org/users/kolibri/statuses/113767424244037906", "type": "Note", "summary": null, "inReplyTo": null, "published": "2025-01-04T01:12:09Z", "url": "https://qoto.org/@kolibri/113767424244037906", "attributedTo": "https://qoto.org/users/kolibri", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://qoto.org/users/kolibri/followers" ], "sensitive": false, "atomUri": "https://qoto.org/users/kolibri/statuses/113767424244037906", "inReplyToAtomUri": null, "conversation": "tag:qoto.org,2025-01-04:objectId=113767424244021026:objectType=Conversation", "context": "https://qoto.org/contexts/113767424244021026", "content": "<p>### Applied Murphy&#39;s Laws for Cryptography (Loose Interpretation)<br />1. **Law of Encryption Complexity:** <br /> The more complex the encryption algorithm, the faster someone will find a simple way to break it.<br />2. **Law of Limited Time:** <br /> When there&#39;s no time to generate the perfect key, &quot;1234&quot; becomes the default password.<br />3. **Law of Trust:** <br /> The greatest vulnerability in any cryptosystem is the person using it.<br />4. **Law of Privacy Illusion:** <br /> The moment you feel completely anonymous, someone will access your metadata.<br />5. **Law of the Forgotten Key:** <br /> If a private key is created and perfectly secured, you’ll lose access to it at the worst possible moment.<br />6. **Law of Overconfidence:** <br /> &quot;This algorithm is unbreakable&quot; — until a student proves otherwise in their thesis.<br />7. **Developer’s Law:** <br /> The best cryptographic solution you design will be broken by your own testing team.<br />8. **Law of Universality:** <br /> The more universal the crypto algorithm, the more exposed it is to attacks on its weak points.<br />9. **Law of Resource Economy:** <br /> Every cryptosystem is a compromise between security and performance, but breaking it will always be faster.<br />10. **Law of Government Interference:** <br /> If your algorithm is good enough to thwart hackers, regulators will demand a backdoor.<br />11. **Law of the Attacker:** <br /> Your cryptography is never too complex for a hacker, but always too complex for the average user.<br />12. **Law of Unforeseen Flaws:** <br /> Every algorithm has a vulnerability, but you&#39;ll discover it only when it&#39;s too late.<br />13. **Law of Urgent Updates:** <br /> The moment you deploy a new cryptosystem, its algorithm becomes outdated by current standards.<br />14. **Law of Retrospect:** <br /> &quot;No one will break RSA in our lifetime&quot; — until quantum computers prove otherwise.<br />15. **Law of Entropy:** <br /> The more complex the password, the more likely the user is to write it on a sticky note and attach it to their monitor.<br />16. **Law of Crypto-Anarchy:** <br /> The more secure your system, the more it annoys governments and corporations.<br />17. **Law of Simplicity:** <br /> If something in cryptography looks too simple to be broken, it&#39;s already been compromised.<br />18. **Key Length Law:** <br /> The moment you double the key length, someone finds an attack that breaks both the old and new versions.<br />19. **Law of Paranoia:** <br /> In cryptography, you’re either not paranoid enough or already too late.<br />20. **Law of the Last Test:** <br /> The biggest vulnerability will be discovered one minute after the system goes live.<br />---<br />### **Hashtags (23):** <br /><a href=\"https://qoto.org/tags/MurphysLaw\" class=\"mention hashtag\" rel=\"tag\">#<span>MurphysLaw</span></a> <a href=\"https://qoto.org/tags/Cryptography\" class=\"mention hashtag\" rel=\"tag\">#<span>Cryptography</span></a> <a href=\"https://qoto.org/tags/CyberSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberSecurity</span></a> <a href=\"https://qoto.org/tags/Encryption\" class=\"mention hashtag\" rel=\"tag\">#<span>Encryption</span></a> <a href=\"https://qoto.org/tags/DataProtection\" class=\"mention hashtag\" rel=\"tag\">#<span>DataProtection</span></a> <a href=\"https://qoto.org/tags/Privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>Privacy</span></a> <a href=\"https://qoto.org/tags/DigitalSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>DigitalSecurity</span></a> <a href=\"https://qoto.org/tags/CryptoFails\" class=\"mention hashtag\" rel=\"tag\">#<span>CryptoFails</span></a> <a href=\"https://qoto.org/tags/QuantumComputing\" class=\"mention hashtag\" rel=\"tag\">#<span>QuantumComputing</span></a> <a href=\"https://qoto.org/tags/Hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>Hacking</span></a> <a href=\"https://qoto.org/tags/PasswordSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>PasswordSecurity</span></a> <a href=\"https://qoto.org/tags/CryptographicAlgorithms\" class=\"mention hashtag\" rel=\"tag\">#<span>CryptographicAlgorithms</span></a> <a href=\"https://qoto.org/tags/CyberThreats\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberThreats</span></a> <a href=\"https://qoto.org/tags/DataEncryption\" class=\"mention hashtag\" rel=\"tag\">#<span>DataEncryption</span></a> <a href=\"https://qoto.org/tags/KeyManagement\" class=\"mention hashtag\" rel=\"tag\">#<span>KeyManagement</span></a> <a href=\"https://qoto.org/tags/ParanoiaInSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>ParanoiaInSecurity</span></a> <a href=\"https://qoto.org/tags/UnbreakableCode\" class=\"mention hashtag\" rel=\"tag\">#<span>UnbreakableCode</span></a> <a href=\"https://qoto.org/tags/SecurityFlaws\" class=\"mention hashtag\" rel=\"tag\">#<span>SecurityFlaws</span></a> <a href=\"https://qoto.org/tags/BackdoorThreat\" class=\"mention hashtag\" rel=\"tag\">#<span>BackdoorThreat</span></a> <a href=\"https://qoto.org/tags/ITHumor\" class=\"mention hashtag\" rel=\"tag\">#<span>ITHumor</span></a> <a href=\"https://qoto.org/tags/TechAnarchy\" class=\"mention hashtag\" rel=\"tag\">#<span>TechAnarchy</span></a> <a href=\"https://qoto.org/tags/StickyNotePasswords\" class=\"mention hashtag\" rel=\"tag\">#<span>StickyNotePasswords</span></a> <a href=\"https://qoto.org/tags/QuantumThreats\" class=\"mention hashtag\" rel=\"tag\">#<span>QuantumThreats</span></a> <a href=\"https://qoto.org/tags/cryptoinsights\" class=\"mention hashtag\" rel=\"tag\">#<span>cryptoinsights</span></a></p>", "contentMap": { "en": "<p>### Applied Murphy&#39;s Laws for Cryptography (Loose Interpretation)<br />1. **Law of Encryption Complexity:** <br /> The more complex the encryption algorithm, the faster someone will find a simple way to break it.<br />2. **Law of Limited Time:** <br /> When there&#39;s no time to generate the perfect key, &quot;1234&quot; becomes the default password.<br />3. **Law of Trust:** <br /> The greatest vulnerability in any cryptosystem is the person using it.<br />4. **Law of Privacy Illusion:** <br /> The moment you feel completely anonymous, someone will access your metadata.<br />5. **Law of the Forgotten Key:** <br /> If a private key is created and perfectly secured, you’ll lose access to it at the worst possible moment.<br />6. **Law of Overconfidence:** <br /> &quot;This algorithm is unbreakable&quot; — until a student proves otherwise in their thesis.<br />7. **Developer’s Law:** <br /> The best cryptographic solution you design will be broken by your own testing team.<br />8. **Law of Universality:** <br /> The more universal the crypto algorithm, the more exposed it is to attacks on its weak points.<br />9. **Law of Resource Economy:** <br /> Every cryptosystem is a compromise between security and performance, but breaking it will always be faster.<br />10. **Law of Government Interference:** <br /> If your algorithm is good enough to thwart hackers, regulators will demand a backdoor.<br />11. **Law of the Attacker:** <br /> Your cryptography is never too complex for a hacker, but always too complex for the average user.<br />12. **Law of Unforeseen Flaws:** <br /> Every algorithm has a vulnerability, but you&#39;ll discover it only when it&#39;s too late.<br />13. **Law of Urgent Updates:** <br /> The moment you deploy a new cryptosystem, its algorithm becomes outdated by current standards.<br />14. **Law of Retrospect:** <br /> &quot;No one will break RSA in our lifetime&quot; — until quantum computers prove otherwise.<br />15. **Law of Entropy:** <br /> The more complex the password, the more likely the user is to write it on a sticky note and attach it to their monitor.<br />16. **Law of Crypto-Anarchy:** <br /> The more secure your system, the more it annoys governments and corporations.<br />17. **Law of Simplicity:** <br /> If something in cryptography looks too simple to be broken, it&#39;s already been compromised.<br />18. **Key Length Law:** <br /> The moment you double the key length, someone finds an attack that breaks both the old and new versions.<br />19. **Law of Paranoia:** <br /> In cryptography, you’re either not paranoid enough or already too late.<br />20. **Law of the Last Test:** <br /> The biggest vulnerability will be discovered one minute after the system goes live.<br />---<br />### **Hashtags (23):** <br /><a href=\"https://qoto.org/tags/MurphysLaw\" class=\"mention hashtag\" rel=\"tag\">#<span>MurphysLaw</span></a> <a href=\"https://qoto.org/tags/Cryptography\" class=\"mention hashtag\" rel=\"tag\">#<span>Cryptography</span></a> <a href=\"https://qoto.org/tags/CyberSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberSecurity</span></a> <a href=\"https://qoto.org/tags/Encryption\" class=\"mention hashtag\" rel=\"tag\">#<span>Encryption</span></a> <a href=\"https://qoto.org/tags/DataProtection\" class=\"mention hashtag\" rel=\"tag\">#<span>DataProtection</span></a> <a href=\"https://qoto.org/tags/Privacy\" class=\"mention hashtag\" rel=\"tag\">#<span>Privacy</span></a> <a href=\"https://qoto.org/tags/DigitalSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>DigitalSecurity</span></a> <a href=\"https://qoto.org/tags/CryptoFails\" class=\"mention hashtag\" rel=\"tag\">#<span>CryptoFails</span></a> <a href=\"https://qoto.org/tags/QuantumComputing\" class=\"mention hashtag\" rel=\"tag\">#<span>QuantumComputing</span></a> <a href=\"https://qoto.org/tags/Hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>Hacking</span></a> <a href=\"https://qoto.org/tags/PasswordSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>PasswordSecurity</span></a> <a href=\"https://qoto.org/tags/CryptographicAlgorithms\" class=\"mention hashtag\" rel=\"tag\">#<span>CryptographicAlgorithms</span></a> <a href=\"https://qoto.org/tags/CyberThreats\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberThreats</span></a> <a href=\"https://qoto.org/tags/DataEncryption\" class=\"mention hashtag\" rel=\"tag\">#<span>DataEncryption</span></a> <a href=\"https://qoto.org/tags/KeyManagement\" class=\"mention hashtag\" rel=\"tag\">#<span>KeyManagement</span></a> <a href=\"https://qoto.org/tags/ParanoiaInSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>ParanoiaInSecurity</span></a> <a href=\"https://qoto.org/tags/UnbreakableCode\" class=\"mention hashtag\" rel=\"tag\">#<span>UnbreakableCode</span></a> <a href=\"https://qoto.org/tags/SecurityFlaws\" class=\"mention hashtag\" rel=\"tag\">#<span>SecurityFlaws</span></a> <a href=\"https://qoto.org/tags/BackdoorThreat\" class=\"mention hashtag\" rel=\"tag\">#<span>BackdoorThreat</span></a> <a href=\"https://qoto.org/tags/ITHumor\" class=\"mention hashtag\" rel=\"tag\">#<span>ITHumor</span></a> <a href=\"https://qoto.org/tags/TechAnarchy\" class=\"mention hashtag\" rel=\"tag\">#<span>TechAnarchy</span></a> <a href=\"https://qoto.org/tags/StickyNotePasswords\" class=\"mention hashtag\" rel=\"tag\">#<span>StickyNotePasswords</span></a> <a href=\"https://qoto.org/tags/QuantumThreats\" class=\"mention hashtag\" rel=\"tag\">#<span>QuantumThreats</span></a> <a href=\"https://qoto.org/tags/cryptoinsights\" class=\"mention hashtag\" rel=\"tag\">#<span>cryptoinsights</span></a></p>" }, "attachment": [], "tag": [ { "type": "Hashtag", "href": "https://qoto.org/tags/murphyslaw", "name": "#murphyslaw" }, { "type": "Hashtag", "href": "https://qoto.org/tags/cryptography", "name": "#cryptography" }, { "type": "Hashtag", "href": "https://qoto.org/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://qoto.org/tags/encryption", "name": "#encryption" }, { "type": "Hashtag", "href": "https://qoto.org/tags/dataprotection", "name": "#dataprotection" }, { "type": "Hashtag", "href": "https://qoto.org/tags/privacy", "name": "#privacy" }, { "type": "Hashtag", "href": "https://qoto.org/tags/digitalsecurity", "name": "#digitalsecurity" }, { "type": "Hashtag", "href": "https://qoto.org/tags/CryptoFails", "name": "#CryptoFails" }, { "type": "Hashtag", "href": "https://qoto.org/tags/quantumcomputing", "name": "#quantumcomputing" }, { "type": "Hashtag", "href": "https://qoto.org/tags/hacking", "name": "#hacking" }, { "type": "Hashtag", "href": "https://qoto.org/tags/passwordsecurity", "name": "#passwordsecurity" }, { "type": "Hashtag", "href": "https://qoto.org/tags/cryptographicalgorithms", "name": "#cryptographicalgorithms" }, { "type": "Hashtag", "href": "https://qoto.org/tags/cyberthreats", "name": "#cyberthreats" }, { "type": "Hashtag", "href": "https://qoto.org/tags/dataencryption", "name": "#dataencryption" }, { "type": "Hashtag", "href": "https://qoto.org/tags/keymanagement", "name": "#keymanagement" }, { "type": "Hashtag", "href": "https://qoto.org/tags/ParanoiaInSecurity", "name": "#ParanoiaInSecurity" }, { "type": "Hashtag", "href": "https://qoto.org/tags/UnbreakableCode", "name": "#UnbreakableCode" }, { "type": "Hashtag", "href": "https://qoto.org/tags/securityflaws", "name": "#securityflaws" }, { "type": "Hashtag", "href": "https://qoto.org/tags/BackdoorThreat", "name": "#BackdoorThreat" }, { "type": "Hashtag", "href": "https://qoto.org/tags/ithumor", "name": "#ithumor" }, { "type": "Hashtag", "href": "https://qoto.org/tags/TechAnarchy", "name": "#TechAnarchy" }, { "type": "Hashtag", "href": "https://qoto.org/tags/StickyNotePasswords", "name": "#StickyNotePasswords" }, { "type": "Hashtag", "href": "https://qoto.org/tags/QuantumThreats", "name": "#QuantumThreats" }, { "type": "Hashtag", "href": "https://qoto.org/tags/cryptoinsights", "name": "#cryptoinsights" } ], "replies": { "id": "https://qoto.org/users/kolibri/statuses/113767424244037906/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://qoto.org/users/kolibri/statuses/113767424244037906/replies?only_other_accounts=true&page=true", "partOf": "https://qoto.org/users/kolibri/statuses/113767424244037906/replies", "items": [] } } }