Event JSON
{
"id": "c337295ff156e52f1f4e4fd25103b6119f5a2f34a6b1ee822f1bec9935340030",
"pubkey": "0dbd4906423c91cf2e53ae571a4794d00962f64d51345915416751fba70efa28",
"created_at": 1718217306,
"kind": 1,
"tags": [
[
"e",
"e63a665162c4228aa7a69a1f5ac691027e1d5274c7ce16ef5b49e6e6bb21bfe1",
"",
"reply"
],
[
"p",
"0dbd4906423c91cf2e53ae571a4794d00962f64d51345915416751fba70efa28"
],
[
"proxy",
"https://social.polotek.net/@polotek/112605089380158242",
"web"
],
[
"e",
"42e1b182fa9c901b71e2adab0af703fcdbe027746d973e5cf95737fcbe2e956c",
"",
"root"
],
[
"proxy",
"https://social.polotek.net/users/polotek/statuses/112605089380158242",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://social.polotek.net/users/polotek/statuses/112605089380158242",
"pink.momostr"
]
],
"content": "We also took for granted the legal structures that prevent this sort of thing. Any technical restrictions are mostly to create a precedent. There's nothing to stop a malicious actor from creating a real twitter account and paying for access to the API. However, twitter as a corporate entity has the ability to pursue legal action against people who violate it's terms. And that's a bigger deterrent than people realize.",
"sig": "61cf720b50305dcdae43fa1d2e7d9e19d3ea1de73ef2a69d474f9544aa0a04dbb2597c1c49be56bf2479daa1771d26d4c2194ae149c688b20d97ff32b2c1c406"
}