at://jaystevens.me/app.bsky.feed.post/3lc4udwkty22s

Back to Collection

Record JSON

{
  "$type": "app.bsky.feed.post",
  "createdAt": "2024-11-30T00:41:34.040Z",
  "langs": [
    "en"
  ],
  "reply": {
    "parent": {
      "cid": "bafyreigz6v4tfjozzk2wugfg2iozixduvafg2kvp7kwfij2vpqu3bdaxw4",
      "uri": "at://did:plc:qfqibtrg2k7r2p345p4pbgpi/app.bsky.feed.post/3lc4gt4mywc2z"
    },
    "root": {
      "cid": "bafyreigz6v4tfjozzk2wugfg2iozixduvafg2kvp7kwfij2vpqu3bdaxw4",
      "uri": "at://did:plc:qfqibtrg2k7r2p345p4pbgpi/app.bsky.feed.post/3lc4gt4mywc2z"
    }
  },
  "text": "I think I know what the answer to this is, but is there a way for a trust and safety team to verify that cryptographically-private circles aren't being used to share CSAM?"
}