at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3kpmzizmljo24
Back to Collection
Record JSON
{
"$type": "app.bsky.feed.post",
"createdAt": "2024-04-08T15:57:47.973Z",
"langs": [
"en"
],
"reply": {
"parent": {
"cid": "bafyreicdwpuv3pus26qotkfvd2egj2ptxknybanj3v7a57ulkr5esifkpi",
"uri": "at://did:plc:2iv3jz6ylpc4we6msq465jpf/app.bsky.feed.post/3kpm3jzmb3k2l"
},
"root": {
"cid": "bafyreieyyfa423wipq5y3tldahqy6xqk5bkexwhx532ufde7ua3ys7yujy",
"uri": "at://did:plc:iny5qr4bzmkcex5vxrxz6sks/app.bsky.feed.post/3kpjrvazvsi2q"
}
},
"text": "we've thought about this category of issue a fair amount. our threat model is that users have full control over the contents of their repository.\n\nany such mitigation need to live in persistent external systems, or use semi-exotic tech like cryptographic timestamps"
}