at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3kp6mlriksb2l
Back to Collection
Record JSON
{
"$type": "app.bsky.feed.post",
"createdAt": "2024-04-02T22:29:26.729Z",
"langs": [
"en"
],
"reply": {
"parent": {
"cid": "bafyreibhejra6fgwnljpty6kb2faj345mek6qmkibgofk5jx5hbxof3hri",
"uri": "at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3kp6mjgpawe2q"
},
"root": {
"cid": "bafyreiepetys6ztwg6rlubaasvld24bfoq4zv2pmlgvrn5dkars7z5iabi",
"uri": "at://did:plc:ezhjhbzqt32bqprrn6qjlkri/app.bsky.feed.post/3kp5lidho6e2g"
}
},
"text": "we could abstract out the \"consume and verify\" code a bit more to make it easier to build validating appviews.\n\nthe main question is \"why\": what is the threat model, and how does the appview doing validation \"solve\" the threat? if it is just detection, there are easier ways to detect bad actor infra"
}