at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3kuvpev53il2k
Back to Collection
Record JSON
{
"$type": "app.bsky.feed.post",
"createdAt": "2024-06-14T17:56:28.006Z",
"langs": [
"en"
],
"reply": {
"parent": {
"cid": "bafyreid4xtd7yihka5hi433uuac5t7koxaj3yupew77bgrfhkqhycpzfem",
"uri": "at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3kuvp763xqz2q"
},
"root": {
"cid": "bafyreidagbofyynjkeoas6h677el446nycdqcbjt7ixitjv6uhbwupc52a",
"uri": "at://did:plc:ocsbmyulc2grbq3esflddyj6/app.bsky.feed.post/3kuuk2nlkrk2a"
}
},
"text": "we very carefully designed the entire protocol and architecture to enable things like abuse image scanning and takedowns, and can go in to details and corner-cases of this all day. we generally have defense in depth and multiple levers\n\ni'm sure bad actors will find novel vectors though."
}