ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "Hashtag": "as:Hashtag" } ], "id": "https://tldr.nettime.org/users/remixtures/statuses/113532521471217522", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-11-23T13:33:16Z", "url": "https://tldr.nettime.org/@remixtures/113532521471217522", "attributedTo": "https://tldr.nettime.org/users/remixtures", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://tldr.nettime.org/users/remixtures/followers" ], "sensitive": false, "atomUri": "https://tldr.nettime.org/users/remixtures/statuses/113532521471217522", "inReplyToAtomUri": null, "conversation": "tag:tldr.nettime.org,2024-11-23:objectId=21967726:objectType=Conversation", "localOnly": false, "content": "<p>&quot;For determined hackers, sitting in a car outside a target&#39;s building and using radio equipment to breach its Wi-Fi network has long been an effective but risky technique. These risks became all too clear when spies working for Russia&#39;s GRU military intelligence agency were caught red-handed on a city street in the Netherlands in 2018 using an antenna hidden in their car&#39;s trunk to try to hack into the Wi-Fi of the Organization for the Prohibition of Chemical Weapons.</p><p>Since that incident, however, that same unit of Russian military hackers appears to have developed a new and far safer Wi-Fi hacking technique: Instead of venturing into radio range of their target, they found another vulnerable network in a building across the street, remotely hacked into a laptop in that neighboring building, and used that computer&#39;s antenna to break into the Wi-Fi network of their intended victim—a radio-hacking trick that never even required leaving Russian soil.</p><p>At the Cyberwarcon security conference in Arlington, Virginia, today, cybersecurity researcher Steven Adair will reveal how his firm, Volexity, discovered that unprecedented Wi-Fi hacking technique—what the firm is calling a “nearest neighbor attack&quot;—while investigating a network breach targeting a customer in Washington, DC, in 2022. Volexity, which declined to name its DC customer, has since tied the breach to the Russian hacker group known as Fancy Bear, APT28, or Unit 26165.&quot;</p><p><a href=\"https://www.wired.com/story/russia-gru-apt28-wifi-daisy-chain-breach/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">wired.com/story/russia-gru-apt</span><span class=\"invisible\">28-wifi-daisy-chain-breach/</span></a></p><p><a href=\"https://tldr.nettime.org/tags/CyberSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberSecurity</span></a> <a href=\"https://tldr.nettime.org/tags/Russia\" class=\"mention hashtag\" rel=\"tag\">#<span>Russia</span></a> <a href=\"https://tldr.nettime.org/tags/StateHacking\" class=\"mention hashtag\" rel=\"tag\">#<span>StateHacking</span></a> <a href=\"https://tldr.nettime.org/tags/FancyBear\" class=\"mention hashtag\" rel=\"tag\">#<span>FancyBear</span></a> <a href=\"https://tldr.nettime.org/tags/APT28\" class=\"mention hashtag\" rel=\"tag\">#<span>APT28</span></a> <a href=\"https://tldr.nettime.org/tags/Wifi\" class=\"mention hashtag\" rel=\"tag\">#<span>Wifi</span></a></p>", "contentMap": { "pt": "<p>&quot;For determined hackers, sitting in a car outside a target&#39;s building and using radio equipment to breach its Wi-Fi network has long been an effective but risky technique. These risks became all too clear when spies working for Russia&#39;s GRU military intelligence agency were caught red-handed on a city street in the Netherlands in 2018 using an antenna hidden in their car&#39;s trunk to try to hack into the Wi-Fi of the Organization for the Prohibition of Chemical Weapons.</p><p>Since that incident, however, that same unit of Russian military hackers appears to have developed a new and far safer Wi-Fi hacking technique: Instead of venturing into radio range of their target, they found another vulnerable network in a building across the street, remotely hacked into a laptop in that neighboring building, and used that computer&#39;s antenna to break into the Wi-Fi network of their intended victim—a radio-hacking trick that never even required leaving Russian soil.</p><p>At the Cyberwarcon security conference in Arlington, Virginia, today, cybersecurity researcher Steven Adair will reveal how his firm, Volexity, discovered that unprecedented Wi-Fi hacking technique—what the firm is calling a “nearest neighbor attack&quot;—while investigating a network breach targeting a customer in Washington, DC, in 2022. Volexity, which declined to name its DC customer, has since tied the breach to the Russian hacker group known as Fancy Bear, APT28, or Unit 26165.&quot;</p><p><a href=\"https://www.wired.com/story/russia-gru-apt28-wifi-daisy-chain-breach/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">wired.com/story/russia-gru-apt</span><span class=\"invisible\">28-wifi-daisy-chain-breach/</span></a></p><p><a href=\"https://tldr.nettime.org/tags/CyberSecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberSecurity</span></a> <a href=\"https://tldr.nettime.org/tags/Russia\" class=\"mention hashtag\" rel=\"tag\">#<span>Russia</span></a> <a href=\"https://tldr.nettime.org/tags/StateHacking\" class=\"mention hashtag\" rel=\"tag\">#<span>StateHacking</span></a> <a href=\"https://tldr.nettime.org/tags/FancyBear\" class=\"mention hashtag\" rel=\"tag\">#<span>FancyBear</span></a> <a href=\"https://tldr.nettime.org/tags/APT28\" class=\"mention hashtag\" rel=\"tag\">#<span>APT28</span></a> <a href=\"https://tldr.nettime.org/tags/Wifi\" class=\"mention hashtag\" rel=\"tag\">#<span>Wifi</span></a></p>" }, "attachment": [], "tag": [ { "type": "Hashtag", "href": "https://tldr.nettime.org/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://tldr.nettime.org/tags/russia", "name": "#russia" }, { "type": "Hashtag", "href": "https://tldr.nettime.org/tags/statehacking", "name": "#statehacking" }, { "type": "Hashtag", "href": "https://tldr.nettime.org/tags/fancybear", "name": "#fancybear" }, { "type": "Hashtag", "href": "https://tldr.nettime.org/tags/apt28", "name": "#apt28" }, { "type": "Hashtag", "href": "https://tldr.nettime.org/tags/wifi", "name": "#wifi" } ], "replies": { "id": "https://tldr.nettime.org/users/remixtures/statuses/113532521471217522/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://tldr.nettime.org/users/remixtures/statuses/113532521471217522/replies?only_other_accounts=true&page=true", "partOf": "https://tldr.nettime.org/users/remixtures/statuses/113532521471217522/replies", "items": [] } } }