at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3lznyuw7zkc2o

Back to Collection

Record JSON

{
  "$type": "app.bsky.feed.post",
  "createdAt": "2025-09-25T12:57:22.069Z",
  "langs": [
    "en"
  ],
  "reply": {
    "parent": {
      "cid": "bafyreieuyiiyize3vjpqcvmve5z3s457sbwpvimmd2cfugaak4ltjvjhvq",
      "uri": "at://did:plc:44ybard66vv44zksje25o7dz/app.bsky.feed.post/3lznyoag3622o"
    },
    "root": {
      "cid": "bafyreiertcc6qzzmatsqqax6cqozkq3g25cuod54zqoyphh2bzgaunpjoi",
      "uri": "at://did:plc:7zwztfs4yywggefayx7oid35/app.bsky.feed.post/3lzlsnvllws2s"
    }
  },
  "text": "the way we framed this in the earlier design process is that the more acute the harm, the stronger and broader the intervention should be.\n\nsome interventions can be bypassed by user reconfiguration in-app. but extreme harms should require re-building the entire network stack to evade"
}