at://jaystevens.me/app.bsky.feed.post/3lc4udwkty22s
Back to Collection
Record JSON
{
"$type": "app.bsky.feed.post",
"createdAt": "2024-11-30T00:41:34.040Z",
"langs": [
"en"
],
"reply": {
"parent": {
"cid": "bafyreigz6v4tfjozzk2wugfg2iozixduvafg2kvp7kwfij2vpqu3bdaxw4",
"uri": "at://did:plc:qfqibtrg2k7r2p345p4pbgpi/app.bsky.feed.post/3lc4gt4mywc2z"
},
"root": {
"cid": "bafyreigz6v4tfjozzk2wugfg2iozixduvafg2kvp7kwfij2vpqu3bdaxw4",
"uri": "at://did:plc:qfqibtrg2k7r2p345p4pbgpi/app.bsky.feed.post/3lc4gt4mywc2z"
}
},
"text": "I think I know what the answer to this is, but is there a way for a trust and safety team to verify that cryptographically-private circles aren't being used to share CSAM?"
}