ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "blurhash": "toot:blurhash", "focalPoint": { "@container": "@list", "@id": "toot:focalPoint" }, "Hashtag": "as:Hashtag" } ], "id": "https://tastingtraffic.net/users/InternationalTechNews/statuses/109769255768269367", "type": "Note", "summary": null, "inReplyTo": null, "published": "2023-01-28T22:45:19Z", "url": "https://tastingtraffic.net/@InternationalTechNews/109769255768269367", "attributedTo": "https://tastingtraffic.net/users/InternationalTechNews", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://tastingtraffic.net/users/InternationalTechNews/followers" ], "sensitive": false, "atomUri": "https://tastingtraffic.net/users/InternationalTechNews/statuses/109769255768269367", "inReplyToAtomUri": null, "conversation": "tag:tastingtraffic.net,2023-01-28:objectId=139900:objectType=Conversation", "content": "<p><a href=\"https://tastingtraffic.net/tags/Tesla\" class=\"mention hashtag\" rel=\"tag\">#<span>Tesla</span></a> <a href=\"https://tastingtraffic.net/tags/Car\" class=\"mention hashtag\" rel=\"tag\">#<span>Car</span></a> <a href=\"https://tastingtraffic.net/tags/Hacked_Remotely\" class=\"mention hashtag\" rel=\"tag\">#<span>Hacked_Remotely</span></a> From <a href=\"https://tastingtraffic.net/tags/Drone\" class=\"mention hashtag\" rel=\"tag\">#<span>Drone</span></a> via <a href=\"https://tastingtraffic.net/tags/Zero_Click\" class=\"mention hashtag\" rel=\"tag\">#<span>Zero_Click</span></a> <a href=\"https://tastingtraffic.net/tags/Exploit\" class=\"mention hashtag\" rel=\"tag\">#<span>Exploit</span></a> | Two <a href=\"https://tastingtraffic.net/tags/Researchers\" class=\"mention hashtag\" rel=\"tag\">#<span>Researchers</span></a> have shown how a Tesla — and <a href=\"https://tastingtraffic.net/tags/possibly\" class=\"mention hashtag\" rel=\"tag\">#<span>possibly</span></a> <a href=\"https://tastingtraffic.net/tags/other_cars\" class=\"mention hashtag\" rel=\"tag\">#<span>other_cars</span></a> — can be hacked remotely <a href=\"https://tastingtraffic.net/tags/without\" class=\"mention hashtag\" rel=\"tag\">#<span>without</span></a> <a href=\"https://tastingtraffic.net/tags/any_user_interaction\" class=\"mention hashtag\" rel=\"tag\">#<span>any_user_interaction</span></a>. They carried out the <a href=\"https://tastingtraffic.net/tags/attack\" class=\"mention hashtag\" rel=\"tag\">#<span>attack</span></a> from a drone.</p><p>This was the result of research conducted last year by Ralf-Philipp Weinmann of Kunnamon and Benedikt Schmotzle of <a href=\"https://tastingtraffic.net/tags/Comsecuris\" class=\"mention hashtag\" rel=\"tag\">#<span>Comsecuris</span></a>. The analysis was initially carried out for the <a href=\"https://tastingtraffic.net/tags/Pwn2Own\" class=\"mention hashtag\" rel=\"tag\">#<span>Pwn2Own</span></a> 2020 <a href=\"https://tastingtraffic.net/tags/hacking_competition\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking_competition</span></a> — the <a href=\"https://tastingtraffic.net/tags/contest\" class=\"mention hashtag\" rel=\"tag\">#<span>contest</span></a> offered a car and other significant <a href=\"https://tastingtraffic.net/tags/prizes\" class=\"mention hashtag\" rel=\"tag\">#<span>prizes</span></a> for <a href=\"https://tastingtraffic.net/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> a <a href=\"https://tastingtraffic.net/tags/Tesla\" class=\"mention hashtag\" rel=\"tag\">#<span>Tesla</span></a> — but the findings were later reported to Tesla through its <a href=\"https://tastingtraffic.net/tags/bug_bounty\" class=\"mention hashtag\" rel=\"tag\">#<span>bug_bounty</span></a> program after Pwn2Own organizers decided to <a href=\"https://tastingtraffic.net/tags/temporarily_eliminate\" class=\"mention hashtag\" rel=\"tag\">#<span>temporarily_eliminate</span></a> the automotive category due to the coronavirus <a href=\"https://tastingtraffic.net/tags/pandemic\" class=\"mention hashtag\" rel=\"tag\">#<span>pandemic</span></a>.</p><p>The attack, dubbed <a href=\"https://tastingtraffic.net/tags/TBONE\" class=\"mention hashtag\" rel=\"tag\">#<span>TBONE</span></a>, involves <a href=\"https://tastingtraffic.net/tags/exploitation\" class=\"mention hashtag\" rel=\"tag\">#<span>exploitation</span></a> of two <a href=\"https://tastingtraffic.net/tags/vulnerabilities\" class=\"mention hashtag\" rel=\"tag\">#<span>vulnerabilities</span></a> affecting <a href=\"https://tastingtraffic.net/tags/ConnMan\" class=\"mention hashtag\" rel=\"tag\">#<span>ConnMan</span></a>, an internet <a href=\"https://tastingtraffic.net/tags/connection_manager\" class=\"mention hashtag\" rel=\"tag\">#<span>connection_manager</span></a> for <a href=\"https://tastingtraffic.net/tags/embedded_devices\" class=\"mention hashtag\" rel=\"tag\">#<span>embedded_devices</span></a>. An attacker can exploit these <a href=\"https://tastingtraffic.net/tags/flaws\" class=\"mention hashtag\" rel=\"tag\">#<span>flaws</span></a> to take <a href=\"https://tastingtraffic.net/tags/full_control\" class=\"mention hashtag\" rel=\"tag\">#<span>full_control</span></a> of the <a href=\"https://tastingtraffic.net/tags/infotainment_system\" class=\"mention hashtag\" rel=\"tag\">#<span>infotainment_system</span></a> of a Tesla <a href=\"https://tastingtraffic.net/tags/without\" class=\"mention hashtag\" rel=\"tag\">#<span>without</span></a> any <a href=\"https://tastingtraffic.net/tags/user_interaction\" class=\"mention hashtag\" rel=\"tag\">#<span>user_interaction</span></a>.</p><p>A hacker who exploits the vulnerabilities can perform any task that a regular user could from the infotainment system. That includes opening doors, changing seat positions, playing music, controlling the air conditioning, and modifying steering and acceleration modes. However, the researchers explained, “This attack does not yield drive control of the car though.”</p><p>They showed how an attacker could use a drone to launch an attack via Wi-Fi to hack a parked car and open its doors from a distance of up to 100 meters (roughly 300 feet). They claimed the exploit worked against Tesla S, 3, X and Y models.</p><p><a href=\"https://www.securityweek.com/tesla-car-hacked-remotely-drone-zero-click-exploit\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">securityweek.com/tesla-car-hac</span><span class=\"invisible\">ked-remotely-drone-zero-click-exploit</span></a></p><p>TastingTraffic LLC</p><p>Founder of <a href=\"https://tastingtraffic.net/tags/SEO\" class=\"mention hashtag\" rel=\"tag\">#<span>SEO</span></a> (Search Engine Optimization)<br />Founder of <a href=\"https://tastingtraffic.net/tags/RTB\" class=\"mention hashtag\" rel=\"tag\">#<span>RTB</span></a> (Real Time Bidding)<br />Founder of <a href=\"https://tastingtraffic.net/tags/HFT\" class=\"mention hashtag\" rel=\"tag\">#<span>HFT</span></a> (High Frequency Trading)</p><p>Disclaimer: <a href=\"https://tastingtraffic.net\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span class=\"invisible\">https://</span><span class=\"\">tastingtraffic.net</span><span class=\"invisible\"></span></a> and/or <a href=\"http://JustBlameWayne.com\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span class=\"invisible\">http://</span><span class=\"\">JustBlameWayne.com</span><span class=\"invisible\"></span></a> (Decentralized SOCIAL Network) and/or its owners [<a href=\"http://tastingtraffic.com\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span class=\"invisible\">http://</span><span class=\"\">tastingtraffic.com</span><span class=\"invisible\"></span></a>] are not affiliates of this provider or referenced image used. This is NOT an endorsement OR Sponsored (Paid) Promotion/Reshare.</p>", "contentMap": { "en": "<p><a href=\"https://tastingtraffic.net/tags/Tesla\" class=\"mention hashtag\" rel=\"tag\">#<span>Tesla</span></a> <a href=\"https://tastingtraffic.net/tags/Car\" class=\"mention hashtag\" rel=\"tag\">#<span>Car</span></a> <a href=\"https://tastingtraffic.net/tags/Hacked_Remotely\" class=\"mention hashtag\" rel=\"tag\">#<span>Hacked_Remotely</span></a> From <a href=\"https://tastingtraffic.net/tags/Drone\" class=\"mention hashtag\" rel=\"tag\">#<span>Drone</span></a> via <a href=\"https://tastingtraffic.net/tags/Zero_Click\" class=\"mention hashtag\" rel=\"tag\">#<span>Zero_Click</span></a> <a href=\"https://tastingtraffic.net/tags/Exploit\" class=\"mention hashtag\" rel=\"tag\">#<span>Exploit</span></a> | Two <a href=\"https://tastingtraffic.net/tags/Researchers\" class=\"mention hashtag\" rel=\"tag\">#<span>Researchers</span></a> have shown how a Tesla — and <a href=\"https://tastingtraffic.net/tags/possibly\" class=\"mention hashtag\" rel=\"tag\">#<span>possibly</span></a> <a href=\"https://tastingtraffic.net/tags/other_cars\" class=\"mention hashtag\" rel=\"tag\">#<span>other_cars</span></a> — can be hacked remotely <a href=\"https://tastingtraffic.net/tags/without\" class=\"mention hashtag\" rel=\"tag\">#<span>without</span></a> <a href=\"https://tastingtraffic.net/tags/any_user_interaction\" class=\"mention hashtag\" rel=\"tag\">#<span>any_user_interaction</span></a>. They carried out the <a href=\"https://tastingtraffic.net/tags/attack\" class=\"mention hashtag\" rel=\"tag\">#<span>attack</span></a> from a drone.</p><p>This was the result of research conducted last year by Ralf-Philipp Weinmann of Kunnamon and Benedikt Schmotzle of <a href=\"https://tastingtraffic.net/tags/Comsecuris\" class=\"mention hashtag\" rel=\"tag\">#<span>Comsecuris</span></a>. The analysis was initially carried out for the <a href=\"https://tastingtraffic.net/tags/Pwn2Own\" class=\"mention hashtag\" rel=\"tag\">#<span>Pwn2Own</span></a> 2020 <a href=\"https://tastingtraffic.net/tags/hacking_competition\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking_competition</span></a> — the <a href=\"https://tastingtraffic.net/tags/contest\" class=\"mention hashtag\" rel=\"tag\">#<span>contest</span></a> offered a car and other significant <a href=\"https://tastingtraffic.net/tags/prizes\" class=\"mention hashtag\" rel=\"tag\">#<span>prizes</span></a> for <a href=\"https://tastingtraffic.net/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> a <a href=\"https://tastingtraffic.net/tags/Tesla\" class=\"mention hashtag\" rel=\"tag\">#<span>Tesla</span></a> — but the findings were later reported to Tesla through its <a href=\"https://tastingtraffic.net/tags/bug_bounty\" class=\"mention hashtag\" rel=\"tag\">#<span>bug_bounty</span></a> program after Pwn2Own organizers decided to <a href=\"https://tastingtraffic.net/tags/temporarily_eliminate\" class=\"mention hashtag\" rel=\"tag\">#<span>temporarily_eliminate</span></a> the automotive category due to the coronavirus <a href=\"https://tastingtraffic.net/tags/pandemic\" class=\"mention hashtag\" rel=\"tag\">#<span>pandemic</span></a>.</p><p>The attack, dubbed <a href=\"https://tastingtraffic.net/tags/TBONE\" class=\"mention hashtag\" rel=\"tag\">#<span>TBONE</span></a>, involves <a href=\"https://tastingtraffic.net/tags/exploitation\" class=\"mention hashtag\" rel=\"tag\">#<span>exploitation</span></a> of two <a href=\"https://tastingtraffic.net/tags/vulnerabilities\" class=\"mention hashtag\" rel=\"tag\">#<span>vulnerabilities</span></a> affecting <a href=\"https://tastingtraffic.net/tags/ConnMan\" class=\"mention hashtag\" rel=\"tag\">#<span>ConnMan</span></a>, an internet <a href=\"https://tastingtraffic.net/tags/connection_manager\" class=\"mention hashtag\" rel=\"tag\">#<span>connection_manager</span></a> for <a href=\"https://tastingtraffic.net/tags/embedded_devices\" class=\"mention hashtag\" rel=\"tag\">#<span>embedded_devices</span></a>. An attacker can exploit these <a href=\"https://tastingtraffic.net/tags/flaws\" class=\"mention hashtag\" rel=\"tag\">#<span>flaws</span></a> to take <a href=\"https://tastingtraffic.net/tags/full_control\" class=\"mention hashtag\" rel=\"tag\">#<span>full_control</span></a> of the <a href=\"https://tastingtraffic.net/tags/infotainment_system\" class=\"mention hashtag\" rel=\"tag\">#<span>infotainment_system</span></a> of a Tesla <a href=\"https://tastingtraffic.net/tags/without\" class=\"mention hashtag\" rel=\"tag\">#<span>without</span></a> any <a href=\"https://tastingtraffic.net/tags/user_interaction\" class=\"mention hashtag\" rel=\"tag\">#<span>user_interaction</span></a>.</p><p>A hacker who exploits the vulnerabilities can perform any task that a regular user could from the infotainment system. That includes opening doors, changing seat positions, playing music, controlling the air conditioning, and modifying steering and acceleration modes. However, the researchers explained, “This attack does not yield drive control of the car though.”</p><p>They showed how an attacker could use a drone to launch an attack via Wi-Fi to hack a parked car and open its doors from a distance of up to 100 meters (roughly 300 feet). They claimed the exploit worked against Tesla S, 3, X and Y models.</p><p><a href=\"https://www.securityweek.com/tesla-car-hacked-remotely-drone-zero-click-exploit\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">securityweek.com/tesla-car-hac</span><span class=\"invisible\">ked-remotely-drone-zero-click-exploit</span></a></p><p>TastingTraffic LLC</p><p>Founder of <a href=\"https://tastingtraffic.net/tags/SEO\" class=\"mention hashtag\" rel=\"tag\">#<span>SEO</span></a> (Search Engine Optimization)<br />Founder of <a href=\"https://tastingtraffic.net/tags/RTB\" class=\"mention hashtag\" rel=\"tag\">#<span>RTB</span></a> (Real Time Bidding)<br />Founder of <a href=\"https://tastingtraffic.net/tags/HFT\" class=\"mention hashtag\" rel=\"tag\">#<span>HFT</span></a> (High Frequency Trading)</p><p>Disclaimer: <a href=\"https://tastingtraffic.net\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span class=\"invisible\">https://</span><span class=\"\">tastingtraffic.net</span><span class=\"invisible\"></span></a> and/or <a href=\"http://JustBlameWayne.com\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span class=\"invisible\">http://</span><span class=\"\">JustBlameWayne.com</span><span class=\"invisible\"></span></a> (Decentralized SOCIAL Network) and/or its owners [<a href=\"http://tastingtraffic.com\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span class=\"invisible\">http://</span><span class=\"\">tastingtraffic.com</span><span class=\"invisible\"></span></a>] are not affiliates of this provider or referenced image used. This is NOT an endorsement OR Sponsored (Paid) Promotion/Reshare.</p>" }, "attachment": [ { "type": "Document", "mediaType": "image/jpeg", "url": "https://tastingtraffic.net/system/media_attachments/files/109/756/439/527/354/596/original/cdec8090796d45ab.jpg", "name": "#Tesla #Car #Hacked_Remotely From #Drone via #Zero_Click #Exploit | Two #Researchers have shown how a Tesla — and #possibly #other_cars — can be hacked remotely #without #any_user_interaction. They carried out the #attack from a drone.\n\nThis was the result of research conducted last year by Ralf-Philipp Weinmann of Kunnamon and Benedikt Schmotzle of #Comsecuris. The analysis was initially carried out for the #Pwn2Own 2020 #hacking_competition — the #contest offered a car and other significant #prizes for #hacking a #Tesla — but the findings were later reported to Tesla through its #bug_bounty program after Pwn2Own organizers decided to #temporarily_eliminate the automotive category due to the coronavirus #pandemic.\n\nThe attack, dubbed #TBONE, involves #exploitation of two #vulnerabilities affecting #ConnMan, an internet #connection_manager for #embedded_devices. An attacker can exploit these #flaws to take #full_control of the #infotainment_system of a Tesla #without any #user_interaction.", "blurhash": "UqMhx_rWX9RP}sadnjRjyCS$aKWBITt8Rjoc", "focalPoint": [ 0, 0 ], "width": 1462, "height": 965 }, { "type": "Document", "mediaType": "image/jpeg", "url": "https://tastingtraffic.net/system/media_attachments/files/109/756/439/565/289/658/original/97203653aaf299e4.jpg", "name": "#Tesla #Car #Hacked_Remotely From #Drone via #Zero_Click #Exploit | Two #Researchers have shown how a Tesla — and #possibly #other_cars — can be hacked remotely #without #any_user_interaction. They carried out the #attack from a drone.\n\nThis was the result of research conducted last year by Ralf-Philipp Weinmann of Kunnamon and Benedikt Schmotzle of #Comsecuris. The analysis was initially carried out for the #Pwn2Own 2020 #hacking_competition — the #contest offered a car and other significant #prizes for #hacking a #Tesla — but the findings were later reported to Tesla through its #bug_bounty program after Pwn2Own organizers decided to #temporarily_eliminate the automotive category due to the coronavirus #pandemic.\n\nThe attack, dubbed #TBONE, involves #exploitation of two #vulnerabilities affecting #ConnMan, an internet #connection_manager for #embedded_devices. An attacker can exploit these #flaws to take #full_control of the #infotainment_system of a Tesla #without any #user_interaction.", "blurhash": "UWH.KKIU%2oz_NWBt7Rj~qs;kCWBWBkCV@of", "focalPoint": [ 0, 0 ], "width": 1223, "height": 965 }, { "type": "Document", "mediaType": "image/jpeg", "url": "https://tastingtraffic.net/system/media_attachments/files/109/756/439/579/348/336/original/38eb455678919266.jpg", "name": "#Tesla #Car #Hacked_Remotely From #Drone via #Zero_Click #Exploit | Two #Researchers have shown how a Tesla — and #possibly #other_cars — can be hacked remotely #without #any_user_interaction. They carried out the #attack from a drone.\n\nThis was the result of research conducted last year by Ralf-Philipp Weinmann of Kunnamon and Benedikt Schmotzle of #Comsecuris. The analysis was initially carried out for the #Pwn2Own 2020 #hacking_competition — the #contest offered a car and other significant #prizes for #hacking a #Tesla — but the findings were later reported to Tesla through its #bug_bounty program after Pwn2Own organizers decided to #temporarily_eliminate the automotive category due to the coronavirus #pandemic.\n\nThe attack, dubbed #TBONE, involves #exploitation of two #vulnerabilities affecting #ConnMan, an internet #connection_manager for #embedded_devices. An attacker can exploit these #flaws to take #full_control of the #infotainment_system of a Tesla #without any #user_interaction.", "blurhash": "UxP6~wt7-;WBRjt7t7WB~qWBIUWB-;M{Rjt7", "focalPoint": [ 0, 0 ], "width": 1055, "height": 728 }, { "type": "Document", "mediaType": "image/jpeg", "url": "https://tastingtraffic.net/system/media_attachments/files/109/761/597/949/747/425/original/ad5ad82c496e58eb.jpg", "name": "#Intellectual_Tech_News \n\n#TESLA_RECALL | U.S. asks Tesla to Recall 158,000 Vehicles for #Touchscreen_Failures | WASHINGTON (Reuters) - The National Highway Traffic Safety Administration #NHTSA on Wednesday asked Tesla Inc to recall 158,000 #Model_S and #Model_X vehicles over #media_control_unit (MCU) #failures that could pose #safety_risks by leading to touchscreen displays not working | The auto safety agency made the unusual request in a formal letter to Tesla after upgrading a safety probe in November, saying it had tentatively concluded the 2012-2018 Model S and 2016-2018 Model X vehicles “contain a #defect related to #motor_vehicle_safety.”\n\nTesla did not immediately respond to a request for comment but it must respond to NHTSA by Jan. 27. If it does not agree it must provide the agency “with a full explanation of its decision.”\n\nIt is unusual for the agency to formally demand a recall. Automakers typically voluntarily agree to a recall if sought in discussions by regulators.\n\nThe agency said it sought the recall after considering “Tesla’s technical briefing presentation ... and evaluated Tesla’s assertions.”\n\nhttps://www.reuters.com/article/us-tesla-safety/u-s-asks-tesla-to-recall-158000-vehicles-for-touchscreen-failures-idUSKBN29I35K", "blurhash": "UoRCA3Hr.S.mSgW;n*niXmbvaKVsWBWBf7j[", "focalPoint": [ -0.6, 1 ], "width": 485, "height": 732 } ], "tag": [ { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/infotainment_system", "name": "#infotainment_system" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/user_interaction", "name": "#user_interaction" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/SEO", "name": "#SEO" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/RTB", "name": "#RTB" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/HFT", "name": "#HFT" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/tesla", "name": "#tesla" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/car", "name": "#car" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/Hacked_Remotely", "name": "#Hacked_Remotely" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/Drone", "name": "#Drone" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/Zero_Click", "name": "#Zero_Click" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/exploit", "name": "#exploit" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/researchers", "name": "#researchers" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/possibly", "name": "#possibly" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/other_cars", "name": "#other_cars" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/WITHOUT", "name": "#WITHOUT" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/any_user_interaction", "name": "#any_user_interaction" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/attack", "name": "#attack" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/Comsecuris", "name": "#Comsecuris" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/Pwn2Own", "name": "#Pwn2Own" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/hacking_competition", "name": "#hacking_competition" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/CONTEST", "name": "#CONTEST" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/prizes", "name": "#prizes" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/HACKING", "name": "#HACKING" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/bug_bounty", "name": "#bug_bounty" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/temporarily_eliminate", "name": "#temporarily_eliminate" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/pandemic", "name": "#pandemic" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/TBONE", "name": "#TBONE" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/exploitation", "name": "#exploitation" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/vulnerabilities", "name": "#vulnerabilities" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/ConnMan", "name": "#ConnMan" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/connection_manager", "name": "#connection_manager" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/embedded_devices", "name": "#embedded_devices" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/flaws", "name": "#flaws" }, { "type": "Hashtag", "href": "https://tastingtraffic.net/tags/full_control", "name": "#full_control" } ], "replies": { "id": "https://tastingtraffic.net/users/InternationalTechNews/statuses/109769255768269367/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://tastingtraffic.net/users/InternationalTechNews/statuses/109769255768269367/replies?only_other_accounts=true&page=true", "partOf": "https://tastingtraffic.net/users/InternationalTechNews/statuses/109769255768269367/replies", "items": [] } } }