{"id": "https://epicyon.libreserver.org/users/bob/statuses/108276476896280885", "conversation": "tag:mstdn.io,2022-05-10:objectId=107707023:objectType=Conversation", "type": "Note", "summary": null, "inReplyTo": "https://mstdn.io/users/cy/statuses/108276366282021765", "published": "2022-05-10T07:32:01Z", "url": "https://epicyon.libreserver.org/@bob/108276476896280885", "attributedTo": "https://epicyon.libreserver.org/users/bob", "to": ["https://www.w3.org/ns/activitystreams#Public"], "cc": ["https://epicyon.libreserver.org/users/bob/followers", "https://mstdn.io/users/cy", "https://epicyon.libreserver.org/users/bob"], "sensitive": false, "atomUri": "https://epicyon.libreserver.org/users/bob/statuses/108276476896280885", "inReplyToAtomUri": "https://mstdn.io/users/cy/statuses/108276366282021765", "commentsEnabled": true, "rejectReplies": false, "mediaType": "text/html", "content": "
@cy @bob If properly implemented, an adversary can't flood using a different doman name unless they have also stolen the instance actor keys for that domain.
", "contentMap": {"en": "@cy @bob If properly implemented, an adversary can't flood using a different doman name unless they have also stolen the instance actor keys for that domain.
"}, "attachment": [], "tag": [{"href": "https://mstdn.io/@cy", "name": "@cy@mstdn.io", "type": "Mention"}, {"href": "https://epicyon.libreserver.org/@bob", "name": "@bob@epicyon.libreserver.org", "type": "Mention"}], "replies": {}, "@context": ["https://www.w3.org/ns/activitystreams", {"ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "blurhash": "toot:blurhash"}]}