at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3kuvpev53il2k

Back to Collection

Record JSON

{
  "$type": "app.bsky.feed.post",
  "createdAt": "2024-06-14T17:56:28.006Z",
  "langs": [
    "en"
  ],
  "reply": {
    "parent": {
      "cid": "bafyreid4xtd7yihka5hi433uuac5t7koxaj3yupew77bgrfhkqhycpzfem",
      "uri": "at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3kuvp763xqz2q"
    },
    "root": {
      "cid": "bafyreidagbofyynjkeoas6h677el446nycdqcbjt7ixitjv6uhbwupc52a",
      "uri": "at://did:plc:ocsbmyulc2grbq3esflddyj6/app.bsky.feed.post/3kuuk2nlkrk2a"
    }
  },
  "text": "we very carefully designed the entire protocol and architecture to enable things like abuse image scanning and takedowns, and can go in to details and corner-cases of this all day. we generally have defense in depth and multiple levers\n\ni'm sure bad actors will find novel vectors though."
}