A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": "https://www.w3.org/ns/activitystreams",
"type": "OrderedCollectionPage",
"orderedItems": [
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/901779297696489487",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:902234971414630400",
"attributedTo": "https://www.minds.com/api/activitypub/users/901779297696489487",
"content": "Interesting to say the least... Though it remains alarming how many people will click links, much less, install an app from an unknown source.<br /><br /><a href=\"https://www.zdnet.com/article/meet-the-malware-which-turns-your-smartphone-into-a-mobile-proxy/\" target=\"_blank\">https://www.zdnet.com/article/meet-the-malware-which-turns-your-smartphone-into-a-mobile-proxy/</a><br /><br />-- via cyware.com",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/901779297696489487/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/902234971414630400",
"published": "2018-10-25T16:39:39+00:00",
"source": {
"content": "Interesting to say the least... Though it remains alarming how many people will click links, much less, install an app from an unknown source.\n\nhttps://www.zdnet.com/article/meet-the-malware-which-turns-your-smartphone-into-a-mobile-proxy/\n\n-- via cyware.com",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:902234971414630400/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/901779297696489487",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901933589256114176",
"attributedTo": "https://www.minds.com/api/activitypub/users/901779297696489487",
"content": "Couldn't agree more, this approach is one that should be embraced by all in the technology space.<br /><br /><a href=\"https://www.brookings.edu/blog/techtank/2016/03/30/idea-to-retire-cybersecurity-kills-innovation/amp/\" target=\"_blank\">https://www.brookings.edu/blog/techtank/2016/03/30/idea-to-retire-cybersecurity-kills-innovation/amp/</a><br /><br /><a href=\"https://www.minds.com/search?f=top&t=all&q=cybersecurity\" title=\"#cybersecurity\" class=\"u-url hashtag\" target=\"_blank\">#cybersecurity</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=security\" title=\"#security\" class=\"u-url hashtag\" target=\"_blank\">#security</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=breaches\" title=\"#breaches\" class=\"u-url hashtag\" target=\"_blank\">#breaches</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=innovation\" title=\"#innovation\" class=\"u-url hashtag\" target=\"_blank\">#innovation</a>",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/901779297696489487/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/901933589256114176",
"published": "2018-10-24T20:42:04+00:00",
"source": {
"content": "Couldn't agree more, this approach is one that should be embraced by all in the technology space.\n\nhttps://www.brookings.edu/blog/techtank/2016/03/30/idea-to-retire-cybersecurity-kills-innovation/amp/\n\n#cybersecurity #security #breaches #innovation",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901933589256114176/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/901779297696489487",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901805566081126400",
"attributedTo": "https://www.minds.com/api/activitypub/users/901779297696489487",
"content": "Recently, I've been watching this segment much more closely; the more I understand it and dig through the hype, the more potential I see. While there are no silver bullet solutions to infosec, I can definitely see tremendous opportunities ahead when leveraged appropriately. .... Devil's advocate however dictates that for every technology of promise comes technology for wrong doing.... Every infosec leader would be well served in monitoring this space for identification of potential threats, vulnerabilities, exposures, and of course, opportunities.<br /><br /><br /><a href=\"https://www.computerworld.com/article/3315696/blockchain/blockchain-developer-salaries-now-command-as-much-as-175k.amp.html\" target=\"_blank\">https://www.computerworld.com/article/3315696/blockchain/blockchain-developer-salaries-now-command-as-much-as-175k.amp.html</a><br /><br /><a href=\"https://www.minds.com/search?f=top&t=all&q=blockchain\" title=\"#blockchain\" class=\"u-url hashtag\" target=\"_blank\">#blockchain</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=infosec\" title=\"#infosec\" class=\"u-url hashtag\" target=\"_blank\">#infosec</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=cybersecurity\" title=\"#cybersecurity\" class=\"u-url hashtag\" target=\"_blank\">#cybersecurity</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=developers\" title=\"#developers\" class=\"u-url hashtag\" target=\"_blank\">#developers</a>",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/901779297696489487/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/901805566081126400",
"published": "2018-10-24T12:13:21+00:00",
"source": {
"content": "Recently, I've been watching this segment much more closely; the more I understand it and dig through the hype, the more potential I see. While there are no silver bullet solutions to infosec, I can definitely see tremendous opportunities ahead when leveraged appropriately. .... Devil's advocate however dictates that for every technology of promise comes technology for wrong doing.... Every infosec leader would be well served in monitoring this space for identification of potential threats, vulnerabilities, exposures, and of course, opportunities.\n\n\nhttps://www.computerworld.com/article/3315696/blockchain/blockchain-developer-salaries-now-command-as-much-as-175k.amp.html\n\n#blockchain #infosec #cybersecurity #developers",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901805566081126400/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/901779297696489487",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901802772861714432",
"attributedTo": "https://www.minds.com/api/activitypub/users/901779297696489487",
"content": "Cybersucurity in the enterprise is always an ongoing budgetary battle; everyone wants to be secure but the price tag can often be daunting. Security teams and leaders most get out of the \"Sky is falling\" approach and instead leverage a risk-based pragmatic method of business justification and impact awareness.<br /><br />Without this defensible position, the security needs sound like mere noise to the funding audience. In coming across this article, it does a decent job of conveying the basic principles<br /><br /><a href=\"https://www.datacenterknowledge.com/security/are-you-spending-too-much-or-too-little-cybersecurity\" target=\"_blank\">https://www.datacenterknowledge.com/security/are-you-spending-too-much-or-too-little-cybersecurity</a><br /><br /><a href=\"https://www.minds.com/search?f=top&t=all&q=cybersecurity\" title=\"#cybersecurity\" class=\"u-url hashtag\" target=\"_blank\">#cybersecurity</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=infosec\" title=\"#infosec\" class=\"u-url hashtag\" target=\"_blank\">#infosec</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=hacker\" title=\"#hacker\" class=\"u-url hashtag\" target=\"_blank\">#hacker</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=ITSpend\" title=\"#ITSpend\" class=\"u-url hashtag\" target=\"_blank\">#ITSpend</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=blockchain\" title=\"#blockchain\" class=\"u-url hashtag\" target=\"_blank\">#blockchain</a>",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/901779297696489487/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/901802772861714432",
"published": "2018-10-24T12:02:15+00:00",
"source": {
"content": "Cybersucurity in the enterprise is always an ongoing budgetary battle; everyone wants to be secure but the price tag can often be daunting. Security teams and leaders most get out of the \"Sky is falling\" approach and instead leverage a risk-based pragmatic method of business justification and impact awareness.\n\nWithout this defensible position, the security needs sound like mere noise to the funding audience. In coming across this article, it does a decent job of conveying the basic principles\n\nhttps://www.datacenterknowledge.com/security/are-you-spending-too-much-or-too-little-cybersecurity\n\n#cybersecurity #infosec #hacker #ITSpend #blockchain",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901802772861714432/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/901779297696489487",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901800405130498048",
"attributedTo": "https://www.minds.com/api/activitypub/users/901779297696489487",
"content": "With infosec talent at an unprecedented scarcity, the opportunities are tremendous for women to embrace this flourishing field<br /><br /><a href=\"https://www-forbes-com.cdn.ampproject.org/v/s/www.forbes.com/sites/laurencebradford/2018/10/18/cybersecurity-needs-women-heres-why/amp/?amp_js_v=a2&amp_gsa=1&usqp=mq331AQECAFYAQ==#referrer=https://www.google.com&amp_tf=From\" target=\"_blank\">https://www-forbes-com.cdn.ampproject.org/v/s/www.forbes.com/sites/laurencebradford/2018/10/18/cybersecurity-needs-women-heres-why/amp/?amp_js_v=a2&amp_gsa=1&usqp=mq331AQECAFYAQ==#referrer=https://www.google.com&amp_tf=From</a> %1$s&share=<a href=\"https://www.forbes.com/sites/laurencebradford/2018/10/18/cybersecurity-needs-women-heres-why/\" target=\"_blank\">https://www.forbes.com/sites/laurencebradford/2018/10/18/cybersecurity-needs-women-heres-why/</a><br /><a href=\"https://www.minds.com/search?f=top&t=all&q=cybersecurity\" title=\"#cybersecurity\" class=\"u-url hashtag\" target=\"_blank\">#cybersecurity</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=infosec\" title=\"#infosec\" class=\"u-url hashtag\" target=\"_blank\">#infosec</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=womeninsecurity\" title=\"#womeninsecurity\" class=\"u-url hashtag\" target=\"_blank\">#womeninsecurity</a>",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/901779297696489487/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/901800405130498048",
"published": "2018-10-24T11:52:51+00:00",
"source": {
"content": "With infosec talent at an unprecedented scarcity, the opportunities are tremendous for women to embrace this flourishing field\n\nhttps://www-forbes-com.cdn.ampproject.org/v/s/www.forbes.com/sites/laurencebradford/2018/10/18/cybersecurity-needs-women-heres-why/amp/?amp_js_v=a2&_gsa=1&usqp=mq331AQECAFYAQ==#referrer=https://www.google.com&_tf=From %1$s&share=https://www.forbes.com/sites/laurencebradford/2018/10/18/cybersecurity-needs-women-heres-why/\n#cybersecurity #infosec #womeninsecurity",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901800405130498048/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/901779297696489487",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901797836534484992",
"attributedTo": "https://www.minds.com/api/activitypub/users/901779297696489487",
"content": "When ‘What Happens in Vegas’ Ends Up in Your Job Search<br /><br /><a href=\"https://www.linkedin.com/pulse/when-what-happens-vegas-ends-up-your-job-search-gary-burnison\" target=\"_blank\">https://www.linkedin.com/pulse/when-what-happens-vegas-ends-up-your-job-search-gary-burnison</a><br /><br /><a href=\"https://www.minds.com/search?f=top&t=all&q=socialmedia\" title=\"#socialmedia\" class=\"u-url hashtag\" target=\"_blank\">#socialmedia</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=themoreyouknow\" title=\"#themoreyouknow\" class=\"u-url hashtag\" target=\"_blank\">#themoreyouknow</a>",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/901779297696489487/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/901797836534484992",
"published": "2018-10-24T11:42:38+00:00",
"source": {
"content": "When ‘What Happens in Vegas’ Ends Up in Your Job Search\n\nhttps://www.linkedin.com/pulse/when-what-happens-vegas-ends-up-your-job-search-gary-burnison\n\n#socialmedia #themoreyouknow",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901797836534484992/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/901779297696489487",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901794165889388544",
"attributedTo": "https://www.minds.com/api/activitypub/users/901779297696489487",
"content": "Definitely becoming quite visible and outwardly aggressive, <a href=\"https://biztechmagazine.com/article/2018/10/cyberattacks-target-c-suite-rise\" target=\"_blank\">https://biztechmagazine.com/article/2018/10/cyberattacks-target-c-suite-rise</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=cybersecurity\" title=\"#cybersecurity\" class=\"u-url hashtag\" target=\"_blank\">#cybersecurity</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=phishing\" title=\"#phishing\" class=\"u-url hashtag\" target=\"_blank\">#phishing</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=whaling\" title=\"#whaling\" class=\"u-url hashtag\" target=\"_blank\">#whaling</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=hacking\" title=\"#hacking\" class=\"u-url hashtag\" target=\"_blank\">#hacking</a> <a href=\"https://www.minds.com/search?f=top&t=all&q=infosec\" title=\"#infosec\" class=\"u-url hashtag\" target=\"_blank\">#infosec</a> ",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/901779297696489487/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/901794165889388544",
"published": "2018-10-24T11:28:03+00:00",
"source": {
"content": "Definitely becoming quite visible and outwardly aggressive, https://biztechmagazine.com/article/2018/10/cyberattacks-target-c-suite-rise #cybersecurity #phishing #whaling #hacking #infosec ",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901794165889388544/activity"
},
{
"type": "Create",
"actor": "https://www.minds.com/api/activitypub/users/901779297696489487",
"object": {
"type": "Note",
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901793053522169856",
"attributedTo": "https://www.minds.com/api/activitypub/users/901779297696489487",
"content": "Wow, that'll leave a mark I'm sure.... <a href=\"https://thehill.com/policy/technology/412800-yahoo-paying-50m-in-damages-in-biggest-security-breach-in-history\" target=\"_blank\">https://thehill.com/policy/technology/412800-yahoo-paying-50m-in-damages-in-biggest-security-breach-in-history</a>",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://www.minds.com/api/activitypub/users/901779297696489487/followers"
],
"tag": [],
"url": "https://www.minds.com/newsfeed/901793053522169856",
"published": "2018-10-24T11:23:38+00:00",
"source": {
"content": "Wow, that'll leave a mark I'm sure.... https://thehill.com/policy/technology/412800-yahoo-paying-50m-in-damages-in-biggest-security-breach-in-history",
"mediaType": "text/plain"
}
},
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/entities/urn:activity:901793053522169856/activity"
}
],
"id": "https://www.minds.com/api/activitypub/users/901779297696489487/outbox",
"partOf": "https://www.minds.com/api/activitypub/users/901779297696489487/outboxoutbox"
}