at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3kpmzizmljo24

Back to Collection

Record JSON

{
  "$type": "app.bsky.feed.post",
  "createdAt": "2024-04-08T15:57:47.973Z",
  "langs": [
    "en"
  ],
  "reply": {
    "parent": {
      "cid": "bafyreicdwpuv3pus26qotkfvd2egj2ptxknybanj3v7a57ulkr5esifkpi",
      "uri": "at://did:plc:2iv3jz6ylpc4we6msq465jpf/app.bsky.feed.post/3kpm3jzmb3k2l"
    },
    "root": {
      "cid": "bafyreieyyfa423wipq5y3tldahqy6xqk5bkexwhx532ufde7ua3ys7yujy",
      "uri": "at://did:plc:iny5qr4bzmkcex5vxrxz6sks/app.bsky.feed.post/3kpjrvazvsi2q"
    }
  },
  "text": "we've thought about this category of issue a fair amount. our threat model is that users have full control over the contents of their repository.\n\nany such mitigation need to live in persistent external systems, or use semi-exotic tech like cryptographic timestamps"
}