A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": "https://www.w3.org/ns/activitystreams",
"type": "OrderedCollectionPage",
"orderedItems": [
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1709274228420775942",
"attributedTo": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"content": "How do you protect your business from zero-day attacks?<br />As a cybersecurity enthusiast, I've noticed the increasing frequency of these attacks, which exploit unknown vulnerabilities. Let's discuss strategies to safeguard our businesses.<br /><a href=\"https://oversitesentry.com/2-stories-about-zero-day-vulnerabilities-exemplify-need-of-update-program/\" target=\"_blank\">https://oversitesentry.com/2-stories-about-zero-day-vulnerabilities-exemplify-need-of-update-program/</a>",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/1175826871514832897/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/1709274228420775942",
"published": "2024-11-29T16:45:32+00:00",
"source": {
"content": "How do you protect your business from zero-day attacks?\nAs a cybersecurity enthusiast, I've noticed the increasing frequency of these attacks, which exploit unknown vulnerabilities. Let's discuss strategies to safeguard our businesses.\nhttps://oversitesentry.com/2-stories-about-zero-day-vulnerabilities-exemplify-need-of-update-program/",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1709274228420775942/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1708276067153743880",
"attributedTo": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"content": "<br />Create a Security Policy Using NIST Framework<br /><a href=\"https://fixvirus.com/create-a-security-policy-using-nist-framework/\" target=\"_blank\">https://fixvirus.com/create-a-security-policy-using-nist-framework/</a><br />Also PCI compliance - using Claude AI and others (Claude was better)<br /><br />Working on several Security policies now...",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/1175826871514832897/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/1708276067153743880",
"published": "2024-11-26T22:39:12+00:00",
"attachment": [
{
"type": "Document",
"url": "https://cdn.minds.com/fs/v1/thumbnail/1708276006592188420/xlarge/",
"mediaType": "image/jpeg",
"height": 735,
"width": 1110
}
],
"source": {
"content": "\nCreate a Security Policy Using NIST Framework\nhttps://fixvirus.com/create-a-security-policy-using-nist-framework/\nAlso PCI compliance - using Claude AI and others (Claude was better)\n\nWorking on several Security policies now...",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1708276067153743880/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1705700985613062161",
"attributedTo": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"content": "Can Nvidia Accelerate Computing 4x Every Year?<br /><a href=\"https://oversitesentry.com/can-nvidia-technology-accelerate-computing-4x-every-year/\" target=\"_blank\">https://oversitesentry.com/can-nvidia-technology-accelerate-computing-4x-every-year/</a><br />And as a result will the hackers also improve their attack infrastructure?",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/1175826871514832897/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/1705700985613062161",
"published": "2024-11-19T20:06:44+00:00",
"attachment": [
{
"type": "Document",
"url": "https://cdn.minds.com/fs/v1/thumbnail/1705700958505275405/xlarge/",
"mediaType": "image/jpeg",
"height": 600,
"width": 918
}
],
"source": {
"content": "Can Nvidia Accelerate Computing 4x Every Year?\nhttps://oversitesentry.com/can-nvidia-technology-accelerate-computing-4x-every-year/\nAnd as a result will the hackers also improve their attack infrastructure?",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1705700985613062161/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1703186618128535568",
"attributedTo": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"content": "Why Does Humanity Deny Cybersecurity Needs?<br /><a href=\"https://oversitesentry.com/why-humanity-denies-cybersecurity-needs/\" target=\"_blank\">https://oversitesentry.com/why-humanity-denies-cybersecurity-needs/</a><br />Cognitive Biases is one answer - here are 5 of them to think about including<br />Status Quo Bias, Gambler's Fallacy, Ostrich Effect, Anchoring Effect. and Confirmation Bias.",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/1175826871514832897/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/1703186618128535568",
"published": "2024-11-12T21:35:32+00:00",
"attachment": [
{
"type": "Document",
"url": "https://cdn.minds.com/fs/v1/thumbnail/1703186605579177993/xlarge/",
"mediaType": "image/jpeg",
"height": 1200,
"width": 1774
}
],
"source": {
"content": "Why Does Humanity Deny Cybersecurity Needs?\nhttps://oversitesentry.com/why-humanity-denies-cybersecurity-needs/\nCognitive Biases is one answer - here are 5 of them to think about including\nStatus Quo Bias, Gambler's Fallacy, Ostrich Effect, Anchoring Effect. and Confirmation Bias.",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1703186618128535568/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1702781974524989456",
"attributedTo": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"content": "Thank you for your service veterans!!",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/1175826871514832897/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/1702781974524989456",
"published": "2024-11-11T18:47:38+00:00",
"attachment": [
{
"type": "Document",
"url": "https://cdn.minds.com/fs/v1/thumbnail/1702781964144087057/xlarge/",
"mediaType": "image/jpeg",
"height": 470,
"width": 780
}
],
"source": {
"content": "Thank you for your service veterans!!",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1702781974524989456/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1701735040234295300",
"attributedTo": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"content": "Security news Analyzed top30 - new site at #2<br /><a href=\"http://oversitesentry.com/security-news-reviewed/\" target=\"_blank\">http://oversitesentry.com/security-news-reviewed/</a><br />Linuxsecurity.com gives great vulnerability updates",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/1175826871514832897/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/1701735040234295300",
"published": "2024-11-08T21:27:29+00:00",
"attachment": [
{
"type": "Document",
"url": "https://cdn.minds.com/fs/v1/thumbnail/1701734994000482307/xlarge/",
"mediaType": "image/jpeg",
"height": 798,
"width": 871
}
],
"source": {
"content": "Security news Analyzed top30 - new site at #2\nhttp://oversitesentry.com/security-news-reviewed/\nLinuxsecurity.com gives great vulnerability updates",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1701735040234295300/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1699161465388273677",
"attributedTo": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"content": "What happens if you are interested in starting a Cybersecurity program?<br /><br /><a href=\"https://fixvirus.com/pci-compliance-can-be-a-good-start-to-a-security-policy/\" target=\"_blank\">https://fixvirus.com/pci-compliance-can-be-a-good-start-to-a-security-policy/</a><br /><br /> When you have a choice to make for business reasons or security are you going to make it the more secure version or the more convenient? Maybe the convenient might also make it more profitable(initially).<br /><br /><br />a lot more at the website - including an initial security policy for small business",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/1175826871514832897/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/1699161465388273677",
"published": "2024-11-01T19:01:01+00:00",
"attachment": [
{
"type": "Document",
"url": "https://cdn.minds.com/fs/v1/thumbnail/1699161357049401349/xlarge/",
"mediaType": "image/jpeg",
"height": 2550,
"width": 3300
}
],
"source": {
"content": "What happens if you are interested in starting a Cybersecurity program?\n\nhttps://fixvirus.com/pci-compliance-can-be-a-good-start-to-a-security-policy/\n\n When you have a choice to make for business reasons or security are you going to make it the more secure version or the more convenient? Maybe the convenient might also make it more profitable(initially).\n\n\na lot more at the website - including an initial security policy for small business",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1699161465388273677/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1696605491435671568",
"attributedTo": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"content": "Are we Still Waiting for Criminals to use AI?<br /><a href=\"https://oversitesentry.com/are-we-still-waiting-for-criminals-to-use-ai-to-attack/\" target=\"_blank\">https://oversitesentry.com/are-we-still-waiting-for-criminals-to-use-ai-to-attack/</a><br /><a href=\"https://www.minds.com/search?f=top&t=all&q=cybersecurityAI\" title=\"#cybersecurityAI\" class=\"u-url hashtag\" target=\"_blank\">#cybersecurityAI</a> criminals hire hackers to use AI to improve attacks<br />",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/1175826871514832897/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/1696605491435671568",
"published": "2024-10-25T17:44:30+00:00",
"attachment": [
{
"type": "Document",
"url": "https://cdn.minds.com/fs/v1/thumbnail/1696605478366220293/xlarge/",
"mediaType": "image/jpeg",
"height": 2100,
"width": 1600
}
],
"source": {
"content": "Are we Still Waiting for Criminals to use AI?\nhttps://oversitesentry.com/are-we-still-waiting-for-criminals-to-use-ai-to-attack/\n#cybersecurityAI criminals hire hackers to use AI to improve attacks\n",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1696605491435671568/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1692619589902405635",
"attributedTo": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"content": "Latest video on Rumble, YouTube, and Spotify about Cybersecurity frameworks<br /><a href=\"https://fixvirus.com/latest-video-on-rumble-youtube-and-spotify/\" target=\"_blank\">https://fixvirus.com/latest-video-on-rumble-youtube-and-spotify/</a><br />NIST Cybersecurity Framework in specific. <a href=\"https://www.minds.com/search?f=top&t=all&q=cybersecurity\" title=\"#cybersecurity\" class=\"u-url hashtag\" target=\"_blank\">#cybersecurity</a>",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/1175826871514832897/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/1692619589902405635",
"published": "2024-10-14T17:45:57+00:00",
"attachment": [
{
"type": "Document",
"url": "https://cdn.minds.com/fs/v1/thumbnail/1692619530041298962/xlarge/",
"mediaType": "image/jpeg",
"height": 646,
"width": 1006
}
],
"source": {
"content": "Latest video on Rumble, YouTube, and Spotify about Cybersecurity frameworks\nhttps://fixvirus.com/latest-video-on-rumble-youtube-and-spotify/\nNIST Cybersecurity Framework in specific. #cybersecurity",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1692619589902405635/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1683141952716935169",
"attributedTo": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"content": "3 'Interesting' Cybersecurity issues<br /><a href=\"https://oversitesentry.com/3-ongoing-cybersecurity-issues-interesting/\" target=\"_blank\">https://oversitesentry.com/3-ongoing-cybersecurity-issues-interesting/</a><br />Ivanti cloud appliance obsolete (must replace)<br />Google ads are fake could cause someone to mistake tech support for hackers<br />finally: The Microsoft patch that unwittingly did not allow an update - but must be updated now!!<br />Patching Microsoft must be an automatic process for cybersecurity programs",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/1175826871514832897/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/1683141952716935169",
"published": "2024-09-18T14:05:12+00:00",
"attachment": [
{
"type": "Document",
"url": "https://cdn.minds.com/fs/v1/thumbnail/1683141918487220230/xlarge/",
"mediaType": "image/jpeg",
"height": 1600,
"width": 1500
}
],
"source": {
"content": "3 'Interesting' Cybersecurity issues\nhttps://oversitesentry.com/3-ongoing-cybersecurity-issues-interesting/\nIvanti cloud appliance obsolete (must replace)\nGoogle ads are fake could cause someone to mistake tech support for hackers\nfinally: The Microsoft patch that unwittingly did not allow an update - but must be updated now!!\nPatching Microsoft must be an automatic process for cybersecurity programs",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1683141952716935169/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1673834047932993554",
"attributedTo": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"content": "To pay ransomware or not to pay<br />Paying terrorists is illegal - making sure you don't get it again!<br />fixvirus show channel <br /><a href=\"https://youtu.be/FDHrWLYbqOA\" target=\"_blank\">https://youtu.be/FDHrWLYbqOA</a> <br />million$ question - Are your backups good?<br />Eat your wheaties - test your backup ",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/1175826871514832897/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/1673834047932993554",
"published": "2024-08-23T21:38:54+00:00",
"attachment": [
{
"type": "Document",
"url": "https://cdn.minds.com/fs/v1/thumbnail/1673834028429479938/xlarge/",
"mediaType": "image/jpeg",
"height": 1200,
"width": 1700
}
],
"source": {
"content": "To pay ransomware or not to pay\nPaying terrorists is illegal - making sure you don't get it again!\nfixvirus show channel \nhttps://youtu.be/FDHrWLYbqOA \nmillion$ question - Are your backups good?\nEat your wheaties - test your backup ",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1673834047932993554/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1671207570053795853",
"attributedTo": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"content": "What are the key areas to audit in cybersecurity?<br /><a href=\"https://oversitesentry.com/key-areas-to-audit-in-cybersecurity/\" target=\"_blank\">https://oversitesentry.com/key-areas-to-audit-in-cybersecurity/</a><br />Starting a new video also with intersection of how to use AI with cyberdefense.<br /><a href=\"https://www.minds.com/search?f=top&t=all&q=AIcybersecurity\" title=\"#AIcybersecurity\" class=\"u-url hashtag\" target=\"_blank\">#AIcybersecurity</a>",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/1175826871514832897/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/1671207570053795853",
"published": "2024-08-16T15:42:13+00:00",
"attachment": [
{
"type": "Document",
"url": "https://cdn.minds.com/fs/v1/thumbnail/1671207559995854863/xlarge/",
"mediaType": "image/jpeg",
"height": 398,
"width": 603
}
],
"source": {
"content": "What are the key areas to audit in cybersecurity?\nhttps://oversitesentry.com/key-areas-to-audit-in-cybersecurity/\nStarting a new video also with intersection of how to use AI with cyberdefense.\n#AIcybersecurity",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1671207570053795853/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1665766313559068688",
"attributedTo": "https://www.minds.com/api/activitypub/users/1175826871514832897",
"content": "Can AI be used by Attackers?<br /><a href=\"https://oversitesentry.com/can-ai-be-used-by-attackers/\" target=\"_blank\">https://oversitesentry.com/can-ai-be-used-by-attackers/</a><br />Does the earth go around the sun?<br />It is easy to make puns, but old principle: \"what we use can be used against us\" or tools and technologies have good and bad uses.<br /><a href=\"https://www.minds.com/search?f=top&t=all&q=cybersecurity\" title=\"#cybersecurity\" class=\"u-url hashtag\" target=\"_blank\">#cybersecurity</a> means what we like is used against us.",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/1175826871514832897/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/1665766313559068688",
"published": "2024-08-01T15:20:37+00:00",
"attachment": [
{
"type": "Document",
"url": "https://cdn.minds.com/fs/v1/thumbnail/1665766290473619474/xlarge/",
"mediaType": "image/jpeg",
"height": 900,
"width": 1200
}
],
"source": {
"content": "Can AI be used by Attackers?\nhttps://oversitesentry.com/can-ai-be-used-by-attackers/\nDoes the earth go around the sun?\nIt is easy to make puns, but old principle: \"what we use can be used against us\" or tools and technologies have good and bad uses.\n#cybersecurity means what we like is used against us.",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/entities/urn:activity:1665766313559068688/activity"
}
],
"id": "https://www.minds.com/api/activitypub/users/1175826871514832897/outbox",
"partOf": "https://www.minds.com/api/activitypub/users/1175826871514832897/outboxoutbox"
}