ATProto Browser

ATProto Browser

Experimental browser for the Atmosphere

Post

• If an attacker gains control over a satellite or injects malicious code into its communication protocols, they could intercept, alter, or reroute data between users and service providers. • This could allow them to spy on communications, steal credentials, or manipulate transmitted data.

Apr 29, 2025, 6:55 PM

Record data

{
  "uri": "at://did:plc:o2fsik6k75hqhtrbtbry3o2p/app.bsky.feed.post/3lnxxffs6dk2j",
  "cid": "bafyreifh2llpxlotwe6mn6vjtokpokhklp6qc27mwwx725znrtw34uu7uy",
  "value": {
    "text": "• If an attacker gains control over a satellite or injects malicious code into its communication protocols, they could intercept, alter, or reroute data between users and service providers.\n\n• This could allow them to spy on communications, steal credentials, or manipulate transmitted data.",
    "$type": "app.bsky.feed.post",
    "langs": [
      "en"
    ],
    "reply": {
      "root": {
        "cid": "bafyreigzfs2yenbyxax6dztuwwe5atawts2pb73xckbfi6lmbhdpyogj34",
        "uri": "at://did:plc:o3syolcwxhsjc5nb3vvnnsxl/app.bsky.feed.post/3llgzpq477i2j"
      },
      "parent": {
        "cid": "bafyreiffdm4ghylmbtcf5vseydfu7qqpxs4ogdn3knvyvovw6y7iyh6n5m",
        "uri": "at://did:plc:o2fsik6k75hqhtrbtbry3o2p/app.bsky.feed.post/3lnxxffmdss2j"
      }
    },
    "createdAt": "2025-04-29T18:55:05.437Z"
  }
}