at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3kp6mlriksb2l

Back to Collection

Record JSON

{
  "$type": "app.bsky.feed.post",
  "createdAt": "2024-04-02T22:29:26.729Z",
  "langs": [
    "en"
  ],
  "reply": {
    "parent": {
      "cid": "bafyreibhejra6fgwnljpty6kb2faj345mek6qmkibgofk5jx5hbxof3hri",
      "uri": "at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3kp6mjgpawe2q"
    },
    "root": {
      "cid": "bafyreiepetys6ztwg6rlubaasvld24bfoq4zv2pmlgvrn5dkars7z5iabi",
      "uri": "at://did:plc:ezhjhbzqt32bqprrn6qjlkri/app.bsky.feed.post/3kp5lidho6e2g"
    }
  },
  "text": "we could abstract out the \"consume and verify\" code a bit more to make it easier to build validating appviews.\n\nthe main question is \"why\": what is the threat model, and how does the appview doing validation \"solve\" the threat? if it is just detection, there are easier ways to detect bad actor infra"
}