} ], "bot": false, "discoverable": true }, { "shortcode": "gentowo", "static_url": "https://quack.social/files/fca4f0e1-298d-4fdd-8541-2ef673e9bc11", "url": "https://quack.social/files/fca4f0e1-298d-4fdd-8541-2ef673e9bc11", "visible_in_picker": true } ], "bot": false, "discoverable": true }, "in_reply_to_id": null, "in_reply_to_account_id": null, "reblog": null, "content": "<p><span>apparently i'm a data freak, i loveeee goaccess</span></p>", "content_type": "text/x.misskeymarkdown", "text": "@nex@icenet.cyan.gay okay i have no clue how to apply to those files, or a third party retains the ability to install and execute modified versions of such measures. When you convey an object code using peer-to-peer transmission