ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": "https://www.w3.org/ns/activitystreams", "type": "OrderedCollectionPage", "orderedItems": [ { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/1050161773270802450", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/1050161773270802450/entities/urn:activity:1052947665982742528", "attributedTo": "https://www.minds.com/api/activitypub/users/1050161773270802450", "content": "This social media post is dedicated to all those who have saught to light up the darkness on the U.S. government’s secret mass surveillance systems, particularly the courageous whistle-blowers who have risked their liberty and life to do so.<br /><br />The United States government has perfected a technological capability that enables us to monitor the messages or data or EF waves that go through the air. This includes monitoring electromagnetic frequencies, human biofields, energetic patterns and frequencies from other planets within other star systems within our galaxy.<br /><br />That capability is being used against the American people and the entire world. This technology is being used in a secret and silent cosmic war between different types of beings from various star systems.<br /><br />The government has the ability to basically hear all, see all, with a few exceptions.<br /><br />They can hear you inside any room of your house.<br /><br />Indeed, opposition to government invasion of privacy was a major factor in the establishment of the United States itself, as American colonists protested laws that let British officials ransack at will any home they wished. It was legitimate, the colonists agreed, for the State to obtain specific, targeted warrants to search individuals when there was evidence to establish probable cause of their wrong doing. But general warrants – the practice of making the entire citizenry subject to indiscriminate searches – were inherently illegitimate. The Fourth Amendment passed. It was intended, above all, to abolish forever in America the power of the government to subject its citizens to generalized, suspicionless surveillance.<br /><br />Even before Snowden’s revelations it was already become clear that treating the United States as somehow exceptional on the issue of surveillance is a highly naïve stance.<br /><br />In fact, although the U.S. government is “sharing” (actually collecting more power for themselves because they get data as well) their internet, phone, email, etc. Surveillance with other countries, it’s what they are not sharing with everyone that’s the key. It’s the next level above. It’s a higher level of secrecy. The type of secrecy that can get you killed.<br /><br />Maybe somewhere, someone will show us some classified top secret documents on these technologies.<br />Because of the special access technical experts have, like Snowden had, to computer systems and technologies, there are many who see much secret things. Many of them are quite bad and dark. Then, you begin to understand that what the U.S. government really does in the world is very different from what I’d always been taught.<br /><br />That recognition, in turn leads you to start re-evaluating how you look at things, to question things more.<br />One thing that keeps a person passive and compliant is fear of repercussions, but once you let go of your attachment to things that don’t ultimately matter – money, career, physical safety – you can overcome that fear.<br />As for many in Snowden’s generation, “the Internet” wasn’t some isolated tool to use for discrete tasks. It was the world in which their mind and personality developed, a place unto itself that seemed to offer freedom, exploration, and the potential for intellectual growth and understanding. And yes, it can be that for those who feel pulled towards it deeply. However, be careful, do not trust machines. Know their capabilities, be a warrior.<br /><br />Just imagine if “the Internet” and wi-fi had not went public and that you had no idea nor concept of invisible packets of data flying through the air from one place to the next; then, let’s suppose someone came along and said, “Hey, the government is sending invisible packets of data through the air secretly” it would seem like the person is talking about telepathy, it would sound unbelievable. This is the realm of Singals Intelligence or SIGINT. There is also COMINT or Communications Intelligence and MASINT or Measurement and Signature Intelligence. These things are real and this is only the stuff the public already knows about but does not include all the capabilities they have that are still secret. I will talk more about that later in my upcoming book.<br /><br />The “Truth Movement” is mostly the truth except that they leave a bunch of it out – like the parts where they have all this top secret energetic, electromagnetic and plasmic technologies to use for mass surveillance and weapons against the people in the so called “Truth Movement.”<br /><br />One document from the Snowden files, dated October 3, 2012, chillingly underscores the point. It revealed that the agency has been monitoring / targeting the online activities of individuals it believes express “radical” ideas and who have a “radicalizing” influence on others.<br /><br />The NSA explicitly states that none of the targeted individuals is a member of a terrorist organization or involved in any terror plots. Instead, their crime is the “view” they “express” which are deemed “radical,” a term that warrants pervasive surveillance and destructive campaigns to “exploit vulnerabilities.” Where have we heard that from before?<br /><br />If they can target a website as a “malicious-foreign actor” then they can target biofield energy (being used remotely to target targets) as one too.<br /><br />This effectively means they would trace the energy back to you and target you as an individual. We need “Tor for the human biofield.” We need “proxies” and “VPN’s” for the human biofield too. What about “servers?”<br />They have already demonstrated the ability to hack into the Amygdala in the brain, hack into the heart to speed it up, and to implant thoughts. Therefore, obviously, we can be hacked. Our minds, bodies and bio-energies can be read like a disc, tracked, modified, programmed and reprogrammed.<br /><br />Beings from another planet that are contacting one of their hybrid family on earth and are “expressing political ideas” could be considered “terrorists” by the U.S. government. The U.S. government might find my ideas threatening.<br /><br />The GCHQ employs some of the most controversial and radical tactics known to spycraft: “false flag operations,” “honey traps,” “viruses,” and other attacks, strategies of deception, and “information operations to damage reputations.”<br /><br />One Powerpoint slide presented by GCHQ surveillance officials at the 2012 SigDev conference describes two forms of attack: “information operations (influence or deception)” and “technical disruption.”<br />GCHQ refers to these measures as “Online Covert Action” which is intended to achieve what the document calls “The 4 D’s: Deny / Disrupt / Degrade / Deceive.”<br /><br />Another slide describes the tactics used to “discredit a target.” These include “set up a honey trap,” “change their photos on social networking sites,” “write a blog purporting to be one of their victims,” and “email / text their colleagues, neighbors, friends, etc.”<br /><br />Note:<br />Now that the U.S. government is aware that the mind and bio-energy can be hacked they have themselves learned to do it and can track or tap it to eavesdrop. This is SigInt.<br /><br />The GCHQ also likes to use “disruption” techniques “in lieu” of what it calls “traditional law enforcement” such as evidence gathering, courts and prosecutions.<br /><br />The British surveillance agency also uses a team of social scientists, including psychologists, to develop techniques of “online HUMINT” (human intelligence) and “strategic influence disruption.” The document “The Art of Deception: Training for a New Generation of Online Covert Operations” is devoted to these tactics. Prepared by the agency’s HSOC (Human Science Operation Cell), the paper claims to draw on sociology, psychology, anthropology, neuroscience, and biology, among other fields, to maximize the GCHQ’s online deception skills.<br />The title of the next classified paper document revealed might be something eerily similar to the aforementioned document and might be something along the lines of – “The Art of Deception: Training for a New Generation of Biofield Covert Operations.”<br /><br />For the Online Covert Operations, one slide shows how to engage in “Dissimulation – Hide the Real,” while propogating “Simulation – Show the False.”<br />It examines the “psychological building blocks of deception” and the “map of technologies” used to carry out the deceptions. The document then lays out what it calls the “Disruption Operational Playbook.” This includes “infiltration operation,” “ruse operation,” “false flag operation,” and “sting operation,” and “false rescue operation.”<br /><br />All these techniques and strategies are used with the human biofield as well and yes, they have all of the secret technologies to do it.<br /><br />Under the title “Magic Techniques and Experiments,” the document references “legitimization of violence,” “constructing experience in mind of targets which should be accepted so they don’t realize,” and “optimizing deception channels.”<br /><br />Not only does the U.S. government employ teams of covert agents and pseudo-“independent” advocates for “cognitive infiltration” of online groups, chat rooms, social networks, websites, and offline activist groups, but also, according to our people, the human biofield, frequencies of other beings, they can hear and see all (mostly, but there are exceptions, loopholes and shields). They can read your thoughts and intercept telepathic communications inworld and from offworld. This might sound seriously alarming to many, and in fact, it is. These are critical times.<br /><br />These GCHQ documents show for the first time that these controversial techniques to deceive and harm reputations have moved from the proposal stage, to implementation. The government wants to gather the content of all communications and other “signals” no matter what the types (telepathic, online, etc.)<br />And, “an even larger percentage (70%) believes that the government uses this data for purposes other than investigating terrorism.” Moreover, “63% think the government is also gathering information about the content of communications.”<br /><br />Most remarkably, Americans now consider the danger of surveillance of greater concern than the danger of terrorism.<br /><br />They have genetically and molecularly altered our food, our water, our air, our DNA and now they seek to alter the “biofield” and the mind / energy algorithms.<br /><br />While the government, via surveillance, knows more and more about what its citizens are doing, its citizens know less and less about what their government is doing, shielded as it is by a wall of secrecy.<br />When you get into government biofield spying and manipulation and thought implants and beings from other planets, you also start talking about medical issues. Disease can be cured or grown via use of frequencies.“Global Disease Demographics” could be the result of a strategic and intentional placement.<br /><br />We can decide what kind of world we live in. we have the capacity to reason and make decisions, especially in the light of the truth, between light and darkness. That is the purpose of whistle-blowing, of activism, of political journalism, etc.<br /><br />Time after time, people who worked inside government agencies or the military establishment of the United States and its allies have decided that they could not remain silent when they discovered serious wrong doing. Instead, they came forward and made official misdeeds public, sometimes consciously breaking the law to do so and always at great personal cost: risking their careers, their personal relationships, and their freedom.<br /><br />Let them who hear, awaken from heavy sleep. Awaken from your slumber and lift your eyes to the place of the light. I am here to bring life and salvation. You have been in a state of anamnesis, you do not know who you are. It is time to awaken and recognize the soul’s true identity, that is, re-cognition of its celestial origin.", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/1050161773270802450/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/1052947665982742528", "published": "2019-12-15T13:58:06+00:00", "source": { "content": "This social media post is dedicated to all those who have saught to light up the darkness on the U.S. government’s secret mass surveillance systems, particularly the courageous whistle-blowers who have risked their liberty and life to do so.\n\nThe United States government has perfected a technological capability that enables us to monitor the messages or data or EF waves that go through the air. This includes monitoring electromagnetic frequencies, human biofields, energetic patterns and frequencies from other planets within other star systems within our galaxy.\n\nThat capability is being used against the American people and the entire world. This technology is being used in a secret and silent cosmic war between different types of beings from various star systems.\n\nThe government has the ability to basically hear all, see all, with a few exceptions.\n\nThey can hear you inside any room of your house.\n\nIndeed, opposition to government invasion of privacy was a major factor in the establishment of the United States itself, as American colonists protested laws that let British officials ransack at will any home they wished. It was legitimate, the colonists agreed, for the State to obtain specific, targeted warrants to search individuals when there was evidence to establish probable cause of their wrong doing. But general warrants – the practice of making the entire citizenry subject to indiscriminate searches – were inherently illegitimate. The Fourth Amendment passed. It was intended, above all, to abolish forever in America the power of the government to subject its citizens to generalized, suspicionless surveillance.\n\nEven before Snowden’s revelations it was already become clear that treating the United States as somehow exceptional on the issue of surveillance is a highly naïve stance.\n\nIn fact, although the U.S. government is “sharing” (actually collecting more power for themselves because they get data as well) their internet, phone, email, etc. Surveillance with other countries, it’s what they are not sharing with everyone that’s the key. It’s the next level above. It’s a higher level of secrecy. The type of secrecy that can get you killed.\n\nMaybe somewhere, someone will show us some classified top secret documents on these technologies.\nBecause of the special access technical experts have, like Snowden had, to computer systems and technologies, there are many who see much secret things. Many of them are quite bad and dark. Then, you begin to understand that what the U.S. government really does in the world is very different from what I’d always been taught.\n\nThat recognition, in turn leads you to start re-evaluating how you look at things, to question things more.\nOne thing that keeps a person passive and compliant is fear of repercussions, but once you let go of your attachment to things that don’t ultimately matter – money, career, physical safety – you can overcome that fear.\nAs for many in Snowden’s generation, “the Internet” wasn’t some isolated tool to use for discrete tasks. It was the world in which their mind and personality developed, a place unto itself that seemed to offer freedom, exploration, and the potential for intellectual growth and understanding. And yes, it can be that for those who feel pulled towards it deeply. However, be careful, do not trust machines. Know their capabilities, be a warrior.\n\nJust imagine if “the Internet” and wi-fi had not went public and that you had no idea nor concept of invisible packets of data flying through the air from one place to the next; then, let’s suppose someone came along and said, “Hey, the government is sending invisible packets of data through the air secretly” it would seem like the person is talking about telepathy, it would sound unbelievable. This is the realm of Singals Intelligence or SIGINT. There is also COMINT or Communications Intelligence and MASINT or Measurement and Signature Intelligence. These things are real and this is only the stuff the public already knows about but does not include all the capabilities they have that are still secret. I will talk more about that later in my upcoming book.\n\nThe “Truth Movement” is mostly the truth except that they leave a bunch of it out – like the parts where they have all this top secret energetic, electromagnetic and plasmic technologies to use for mass surveillance and weapons against the people in the so called “Truth Movement.”\n\nOne document from the Snowden files, dated October 3, 2012, chillingly underscores the point. It revealed that the agency has been monitoring / targeting the online activities of individuals it believes express “radical” ideas and who have a “radicalizing” influence on others.\n\nThe NSA explicitly states that none of the targeted individuals is a member of a terrorist organization or involved in any terror plots. Instead, their crime is the “view” they “express” which are deemed “radical,” a term that warrants pervasive surveillance and destructive campaigns to “exploit vulnerabilities.” Where have we heard that from before?\n\nIf they can target a website as a “malicious-foreign actor” then they can target biofield energy (being used remotely to target targets) as one too.\n\nThis effectively means they would trace the energy back to you and target you as an individual. We need “Tor for the human biofield.” We need “proxies” and “VPN’s” for the human biofield too. What about “servers?”\nThey have already demonstrated the ability to hack into the Amygdala in the brain, hack into the heart to speed it up, and to implant thoughts. Therefore, obviously, we can be hacked. Our minds, bodies and bio-energies can be read like a disc, tracked, modified, programmed and reprogrammed.\n\nBeings from another planet that are contacting one of their hybrid family on earth and are “expressing political ideas” could be considered “terrorists” by the U.S. government. The U.S. government might find my ideas threatening.\n\nThe GCHQ employs some of the most controversial and radical tactics known to spycraft: “false flag operations,” “honey traps,” “viruses,” and other attacks, strategies of deception, and “information operations to damage reputations.”\n\nOne Powerpoint slide presented by GCHQ surveillance officials at the 2012 SigDev conference describes two forms of attack: “information operations (influence or deception)” and “technical disruption.”\nGCHQ refers to these measures as “Online Covert Action” which is intended to achieve what the document calls “The 4 D’s: Deny / Disrupt / Degrade / Deceive.”\n\nAnother slide describes the tactics used to “discredit a target.” These include “set up a honey trap,” “change their photos on social networking sites,” “write a blog purporting to be one of their victims,” and “email / text their colleagues, neighbors, friends, etc.”\n\nNote:\nNow that the U.S. government is aware that the mind and bio-energy can be hacked they have themselves learned to do it and can track or tap it to eavesdrop. This is SigInt.\n\nThe GCHQ also likes to use “disruption” techniques “in lieu” of what it calls “traditional law enforcement” such as evidence gathering, courts and prosecutions.\n\nThe British surveillance agency also uses a team of social scientists, including psychologists, to develop techniques of “online HUMINT” (human intelligence) and “strategic influence disruption.” The document “The Art of Deception: Training for a New Generation of Online Covert Operations” is devoted to these tactics. Prepared by the agency’s HSOC (Human Science Operation Cell), the paper claims to draw on sociology, psychology, anthropology, neuroscience, and biology, among other fields, to maximize the GCHQ’s online deception skills.\nThe title of the next classified paper document revealed might be something eerily similar to the aforementioned document and might be something along the lines of – “The Art of Deception: Training for a New Generation of Biofield Covert Operations.”\n\nFor the Online Covert Operations, one slide shows how to engage in “Dissimulation – Hide the Real,” while propogating “Simulation – Show the False.”\nIt examines the “psychological building blocks of deception” and the “map of technologies” used to carry out the deceptions. The document then lays out what it calls the “Disruption Operational Playbook.” This includes “infiltration operation,” “ruse operation,” “false flag operation,” and “sting operation,” and “false rescue operation.”\n\nAll these techniques and strategies are used with the human biofield as well and yes, they have all of the secret technologies to do it.\n\nUnder the title “Magic Techniques and Experiments,” the document references “legitimization of violence,” “constructing experience in mind of targets which should be accepted so they don’t realize,” and “optimizing deception channels.”\n\nNot only does the U.S. government employ teams of covert agents and pseudo-“independent” advocates for “cognitive infiltration” of online groups, chat rooms, social networks, websites, and offline activist groups, but also, according to our people, the human biofield, frequencies of other beings, they can hear and see all (mostly, but there are exceptions, loopholes and shields). They can read your thoughts and intercept telepathic communications inworld and from offworld. This might sound seriously alarming to many, and in fact, it is. These are critical times.\n\nThese GCHQ documents show for the first time that these controversial techniques to deceive and harm reputations have moved from the proposal stage, to implementation. The government wants to gather the content of all communications and other “signals” no matter what the types (telepathic, online, etc.)\nAnd, “an even larger percentage (70%) believes that the government uses this data for purposes other than investigating terrorism.” Moreover, “63% think the government is also gathering information about the content of communications.”\n\nMost remarkably, Americans now consider the danger of surveillance of greater concern than the danger of terrorism.\n\nThey have genetically and molecularly altered our food, our water, our air, our DNA and now they seek to alter the “biofield” and the mind / energy algorithms.\n\nWhile the government, via surveillance, knows more and more about what its citizens are doing, its citizens know less and less about what their government is doing, shielded as it is by a wall of secrecy.\nWhen you get into government biofield spying and manipulation and thought implants and beings from other planets, you also start talking about medical issues. Disease can be cured or grown via use of frequencies.“Global Disease Demographics” could be the result of a strategic and intentional placement.\n\nWe can decide what kind of world we live in. we have the capacity to reason and make decisions, especially in the light of the truth, between light and darkness. That is the purpose of whistle-blowing, of activism, of political journalism, etc.\n\nTime after time, people who worked inside government agencies or the military establishment of the United States and its allies have decided that they could not remain silent when they discovered serious wrong doing. Instead, they came forward and made official misdeeds public, sometimes consciously breaking the law to do so and always at great personal cost: risking their careers, their personal relationships, and their freedom.\n\nLet them who hear, awaken from heavy sleep. Awaken from your slumber and lift your eyes to the place of the light. I am here to bring life and salvation. You have been in a state of anamnesis, you do not know who you are. It is time to awaken and recognize the soul’s true identity, that is, re-cognition of its celestial origin.", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/1050161773270802450/entities/urn:activity:1052947665982742528/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/1050161773270802450", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/1050161773270802450/entities/urn:activity:1052737191272353792", "attributedTo": "https://www.minds.com/api/activitypub/users/1050161773270802450", "content": "We all have a light within us. Here is something I put together regarding the light within.", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/1050161773270802450/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/1052737191272353792", "published": "2019-12-15T00:01:45+00:00", "source": { "content": "We all have a light within us. Here is something I put together regarding the light within.", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/1050161773270802450/entities/urn:activity:1052737191272353792/activity" }, { "type": "Create", "actor": "https://www.minds.com/api/activitypub/users/1050161773270802450", "object": { "type": "Note", "id": "https://www.minds.com/api/activitypub/users/1050161773270802450/entities/urn:activity:1052737024906911744", "attributedTo": "https://www.minds.com/api/activitypub/users/1050161773270802450", "content": "I like to say this sacred prayer before I start my morning meditation.", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://www.minds.com/api/activitypub/users/1050161773270802450/followers" ], "tag": [], "url": "https://www.minds.com/newsfeed/1052737024906911744", "published": "2019-12-15T00:01:05+00:00", "source": { "content": "I like to say this sacred prayer before I start my morning meditation.", "mediaType": "text/plain" } }, "id": "https://www.minds.com/api/activitypub/users/1050161773270802450/entities/urn:activity:1052737024906911744/activity" } ], "id": "https://www.minds.com/api/activitypub/users/1050161773270802450/outbox", "partOf": "https://www.minds.com/api/activitypub/users/1050161773270802450/outboxoutbox" }