GET https://kbin.spritesserver.nl/index.php/u/@Dirk@lemmy.ml/newest/2023-06-21::2023-06-21

Security

Token

There is no security token.

Firewall

main Name
Security enabled
Stateless

Configuration

Key Value
provider security.user.provider.concrete.app_user_provider
context main
entry_point App\Security\KbinAuthenticator
user_checker App\Security\UserChecker
access_denied_handler (none)
access_denied_url (none)
authenticators
[
  "two_factor"
  "remember_me"
  "App\Security\KbinAuthenticator"
  "App\Security\FacebookAuthenticator"
  "App\Security\GoogleAuthenticator"
  "App\Security\GithubAuthenticator"
  "App\Security\KeycloakAuthenticator"
]

Listeners

Listener Duration Response
Symfony\Component\Security\Http\Firewall\ChannelListener {#723
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
  -logger: Monolog\Logger {#783 …}
  -httpPort: 80
  -httpsPort: 443
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\ContextListener {#706
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorage {#1017 …}
  -sessionKey: "_security_main"
  -logger: Monolog\Logger {#783 …}
  -userProviders: Symfony\Component\DependencyInjection\Argument\RewindableGenerator {#705 …}
  -dispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
  -registered: false
  -trustResolver: Scheb\TwoFactorBundle\Security\Authentication\AuthenticationTrustResolver {#780 …}
  -sessionTrackerEnabler: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage::enableUsageTracking(): void {#703 …}
}
25.37 ms (none)
Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener {#584
  -authenticatorManager: Symfony\Component\Security\Http\Authentication\AuthenticatorManager {#595 …}
}
0.00 ms (none)
Scheb\TwoFactorBundle\Security\Http\Firewall\TwoFactorAccessListener {#582
  -twoFactorFirewallConfig: Scheb\TwoFactorBundle\Security\TwoFactor\TwoFactorFirewallConfig {#842 …}
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -twoFactorAccessDecider: Scheb\TwoFactorBundle\Security\Authorization\TwoFactorAccessDecider {#581 …}
}
0.06 ms (none)
Symfony\Component\Security\Http\Firewall\AccessListener {#579
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -accessDecisionManager: Symfony\Component\Security\Core\Authorization\TraceableAccessDecisionManager {#937 …}
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\LogoutListener {#786
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -options: [
    "csrf_parameter" => "_csrf_token"
    "csrf_token_id" => "logout"
    "logout_path" => "app_logout"
  ]
  -httpUtils: Symfony\Component\Security\Http\HttpUtils {#841 …}
  -csrfTokenManager: Symfony\Component\Security\Csrf\CsrfTokenManager {#1015 …}
  -eventDispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
}
0.00 ms (none)

Authenticators

No authenticators have been recorded. Check previous profiles on your authentication endpoint.

Access Decision

affirmative Strategy
# Voter class
1
"Symfony\Component\Security\Core\Authorization\Voter\AuthenticatedVoter"
2
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
3
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
4
"Symfony\Component\Security\Core\Authorization\Voter\ExpressionVoter"
5
"App\Security\Voter\EntryCommentVoter"
6
"App\Security\Voter\EntryVoter"
7
"App\Security\Voter\MagazineVoter"
8
"App\Security\Voter\MessageThreadVoter"
9
"App\Security\Voter\MessageVoter"
10
"App\Security\Voter\NotificationVoter"
11
"App\Security\Voter\OAuth2UserConsentVoter"
12
"App\Security\Voter\PostCommentVoter"
13
"App\Security\Voter\PostVoter"
14
"App\Security\Voter\UserVoter"

Access decision log

# Result Attributes Object
1 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
2 DENIED moderate
Proxies\__CG__\App\Entity\Entry {#1551
  +user: Proxies\__CG__\App\Entity\User {#2382 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1550 …}
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#2461 …}
  +slug: "Can-you-steal-a-user-s-identity-if-you-gain-their"
  +title: "Can you steal a user's identity if you gain their old domain name?"
  +url: null
  +body: """
    Just a random thought experiment. Let's say I have my account on a lemmy instance: `userA@mylemmy.com`. One day I decide to stop paying for the domain and move to `userA@mynewlemmy.com`, and someone else gains it and also starts up a lemmy instance.\n
    \n
    If they make their own `userA@mylemmy.com`, how do federated instances distinguish who's who?\n
    \n
    Have I misunderstood the role of domain names in this?
    """
  +type: "article"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 4
  +favouriteCount: 2
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1687334854 {#1683
    date: 2023-06-21 10:07:34.0 +02:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#2456 …}
  +votes: Doctrine\ORM\PersistentCollection {#2453 …}
  +reports: Doctrine\ORM\PersistentCollection {#2454 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1737 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1735 …}
  +badges: Doctrine\ORM\PersistentCollection {#1618 …}
  +children: [
    App\Entity\EntryComment {#1648
      +user: App\Entity\User {#264 …}
      +entry: Proxies\__CG__\App\Entity\Entry {#1551 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1550 …}
      +image: null
      +parent: Proxies\__CG__\App\Entity\EntryComment {#1571 …}
      +root: Proxies\__CG__\App\Entity\EntryComment {#1589 …}
      +body: """
        > That is a vulnerability, albeit a small one.\n
        \n
        “Small one” is very wrong here. This is by far the largest gaping security hole in the whole specification.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1687334854 {#1709
        date: 2023-06-21 10:07:34.0 +02:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@maggoats@lemmy.world"
        "@Setarkus@lemmy.world"
        "@fubo@lemmy.world"
      ]
      +children: Doctrine\ORM\PersistentCollection {#1591 …}
      +nested: Doctrine\ORM\PersistentCollection {#1590 …}
      +votes: Doctrine\ORM\PersistentCollection {#1553 …}
      +reports: Doctrine\ORM\PersistentCollection {#1662 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1565 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1564 …}
      -id: 1776
      -bodyTs: "'albeit':5 'far':18 'gape':21 'hole':23 'largest':20 'one':8,10 'secur':22 'small':7,9 'specif':27 'vulner':4 'whole':26 'wrong':13"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.ml/comment/835771"
      +editedAt: null
      +createdAt: DateTimeImmutable @1687334854 {#1614
        date: 2023-06-21 10:07:34.0 +02:00
      }
      +"title": 1776
    }
  ]
  -id: 230
  -titleTs: "'domain':13 'gain':10 'ident':7 'name':14 'old':12 'steal':3 'user':5"
  -bodyTs: "'account':12 'also':38 'day':19 'decid':21 'distinguish':54 'domain':27,64 'els':34 'experi':5 'feder':52 'gain':35 'instanc':16,43,53 'lemmi':15,42 'let':6 'make':46 'misunderstood':60 'move':29 'name':65 'one':18 'pay':24 'random':3 'role':62 'say':8 'someon':33 'start':39 'stop':23 'thought':4 'usera@mylemmy.com':17,49 'usera@mynewlemmy.com':31"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1687324492
  +visibility: "visible             "
  +apId: "https://lemmy.world/post/356018"
  +editedAt: null
  +createdAt: DateTimeImmutable @1687293992 {#1641
    date: 2023-06-20 22:46:32.0 +02:00
  }
  +__isInitialized__: true
   …2
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
3 DENIED edit
Proxies\__CG__\App\Entity\Entry {#1551
  +user: Proxies\__CG__\App\Entity\User {#2382 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1550 …}
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#2461 …}
  +slug: "Can-you-steal-a-user-s-identity-if-you-gain-their"
  +title: "Can you steal a user's identity if you gain their old domain name?"
  +url: null
  +body: """
    Just a random thought experiment. Let's say I have my account on a lemmy instance: `userA@mylemmy.com`. One day I decide to stop paying for the domain and move to `userA@mynewlemmy.com`, and someone else gains it and also starts up a lemmy instance.\n
    \n
    If they make their own `userA@mylemmy.com`, how do federated instances distinguish who's who?\n
    \n
    Have I misunderstood the role of domain names in this?
    """
  +type: "article"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 4
  +favouriteCount: 2
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1687334854 {#1683
    date: 2023-06-21 10:07:34.0 +02:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#2456 …}
  +votes: Doctrine\ORM\PersistentCollection {#2453 …}
  +reports: Doctrine\ORM\PersistentCollection {#2454 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1737 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1735 …}
  +badges: Doctrine\ORM\PersistentCollection {#1618 …}
  +children: [
    App\Entity\EntryComment {#1648
      +user: App\Entity\User {#264 …}
      +entry: Proxies\__CG__\App\Entity\Entry {#1551 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1550 …}
      +image: null
      +parent: Proxies\__CG__\App\Entity\EntryComment {#1571 …}
      +root: Proxies\__CG__\App\Entity\EntryComment {#1589 …}
      +body: """
        > That is a vulnerability, albeit a small one.\n
        \n
        “Small one” is very wrong here. This is by far the largest gaping security hole in the whole specification.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1687334854 {#1709
        date: 2023-06-21 10:07:34.0 +02:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@maggoats@lemmy.world"
        "@Setarkus@lemmy.world"
        "@fubo@lemmy.world"
      ]
      +children: Doctrine\ORM\PersistentCollection {#1591 …}
      +nested: Doctrine\ORM\PersistentCollection {#1590 …}
      +votes: Doctrine\ORM\PersistentCollection {#1553 …}
      +reports: Doctrine\ORM\PersistentCollection {#1662 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1565 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1564 …}
      -id: 1776
      -bodyTs: "'albeit':5 'far':18 'gape':21 'hole':23 'largest':20 'one':8,10 'secur':22 'small':7,9 'specif':27 'vulner':4 'whole':26 'wrong':13"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.ml/comment/835771"
      +editedAt: null
      +createdAt: DateTimeImmutable @1687334854 {#1614
        date: 2023-06-21 10:07:34.0 +02:00
      }
      +"title": 1776
    }
  ]
  -id: 230
  -titleTs: "'domain':13 'gain':10 'ident':7 'name':14 'old':12 'steal':3 'user':5"
  -bodyTs: "'account':12 'also':38 'day':19 'decid':21 'distinguish':54 'domain':27,64 'els':34 'experi':5 'feder':52 'gain':35 'instanc':16,43,53 'lemmi':15,42 'let':6 'make':46 'misunderstood':60 'move':29 'name':65 'one':18 'pay':24 'random':3 'role':62 'say':8 'someon':33 'start':39 'stop':23 'thought':4 'usera@mylemmy.com':17,49 'usera@mynewlemmy.com':31"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1687324492
  +visibility: "visible             "
  +apId: "https://lemmy.world/post/356018"
  +editedAt: null
  +createdAt: DateTimeImmutable @1687293992 {#1641
    date: 2023-06-20 22:46:32.0 +02:00
  }
  +__isInitialized__: true
   …2
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
4 DENIED moderate
Proxies\__CG__\App\Entity\Entry {#1551
  +user: Proxies\__CG__\App\Entity\User {#2382 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1550 …}
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#2461 …}
  +slug: "Can-you-steal-a-user-s-identity-if-you-gain-their"
  +title: "Can you steal a user's identity if you gain their old domain name?"
  +url: null
  +body: """
    Just a random thought experiment. Let's say I have my account on a lemmy instance: `userA@mylemmy.com`. One day I decide to stop paying for the domain and move to `userA@mynewlemmy.com`, and someone else gains it and also starts up a lemmy instance.\n
    \n
    If they make their own `userA@mylemmy.com`, how do federated instances distinguish who's who?\n
    \n
    Have I misunderstood the role of domain names in this?
    """
  +type: "article"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 4
  +favouriteCount: 2
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1687334854 {#1683
    date: 2023-06-21 10:07:34.0 +02:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#2456 …}
  +votes: Doctrine\ORM\PersistentCollection {#2453 …}
  +reports: Doctrine\ORM\PersistentCollection {#2454 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1737 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1735 …}
  +badges: Doctrine\ORM\PersistentCollection {#1618 …}
  +children: [
    App\Entity\EntryComment {#1648
      +user: App\Entity\User {#264 …}
      +entry: Proxies\__CG__\App\Entity\Entry {#1551 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1550 …}
      +image: null
      +parent: Proxies\__CG__\App\Entity\EntryComment {#1571 …}
      +root: Proxies\__CG__\App\Entity\EntryComment {#1589 …}
      +body: """
        > That is a vulnerability, albeit a small one.\n
        \n
        “Small one” is very wrong here. This is by far the largest gaping security hole in the whole specification.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1687334854 {#1709
        date: 2023-06-21 10:07:34.0 +02:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@maggoats@lemmy.world"
        "@Setarkus@lemmy.world"
        "@fubo@lemmy.world"
      ]
      +children: Doctrine\ORM\PersistentCollection {#1591 …}
      +nested: Doctrine\ORM\PersistentCollection {#1590 …}
      +votes: Doctrine\ORM\PersistentCollection {#1553 …}
      +reports: Doctrine\ORM\PersistentCollection {#1662 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1565 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1564 …}
      -id: 1776
      -bodyTs: "'albeit':5 'far':18 'gape':21 'hole':23 'largest':20 'one':8,10 'secur':22 'small':7,9 'specif':27 'vulner':4 'whole':26 'wrong':13"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.ml/comment/835771"
      +editedAt: null
      +createdAt: DateTimeImmutable @1687334854 {#1614
        date: 2023-06-21 10:07:34.0 +02:00
      }
      +"title": 1776
    }
  ]
  -id: 230
  -titleTs: "'domain':13 'gain':10 'ident':7 'name':14 'old':12 'steal':3 'user':5"
  -bodyTs: "'account':12 'also':38 'day':19 'decid':21 'distinguish':54 'domain':27,64 'els':34 'experi':5 'feder':52 'gain':35 'instanc':16,43,53 'lemmi':15,42 'let':6 'make':46 'misunderstood':60 'move':29 'name':65 'one':18 'pay':24 'random':3 'role':62 'say':8 'someon':33 'start':39 'stop':23 'thought':4 'usera@mylemmy.com':17,49 'usera@mynewlemmy.com':31"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1687324492
  +visibility: "visible             "
  +apId: "https://lemmy.world/post/356018"
  +editedAt: null
  +createdAt: DateTimeImmutable @1687293992 {#1641
    date: 2023-06-20 22:46:32.0 +02:00
  }
  +__isInitialized__: true
   …2
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
5 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
6 DENIED moderate
App\Entity\EntryComment {#1648
  +user: App\Entity\User {#264 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#1551
    +user: Proxies\__CG__\App\Entity\User {#2382 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1550 …}
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#2461 …}
    +slug: "Can-you-steal-a-user-s-identity-if-you-gain-their"
    +title: "Can you steal a user's identity if you gain their old domain name?"
    +url: null
    +body: """
      Just a random thought experiment. Let's say I have my account on a lemmy instance: `userA@mylemmy.com`. One day I decide to stop paying for the domain and move to `userA@mynewlemmy.com`, and someone else gains it and also starts up a lemmy instance.\n
      \n
      If they make their own `userA@mylemmy.com`, how do federated instances distinguish who's who?\n
      \n
      Have I misunderstood the role of domain names in this?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 4
    +favouriteCount: 2
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1687334854 {#1683
      date: 2023-06-21 10:07:34.0 +02:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#2456 …}
    +votes: Doctrine\ORM\PersistentCollection {#2453 …}
    +reports: Doctrine\ORM\PersistentCollection {#2454 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1737 …}
    +notifications: Doctrine\ORM\PersistentCollection {#1735 …}
    +badges: Doctrine\ORM\PersistentCollection {#1618 …}
    +children: [
      App\Entity\EntryComment {#1648}
    ]
    -id: 230
    -titleTs: "'domain':13 'gain':10 'ident':7 'name':14 'old':12 'steal':3 'user':5"
    -bodyTs: "'account':12 'also':38 'day':19 'decid':21 'distinguish':54 'domain':27,64 'els':34 'experi':5 'feder':52 'gain':35 'instanc':16,43,53 'lemmi':15,42 'let':6 'make':46 'misunderstood':60 'move':29 'name':65 'one':18 'pay':24 'random':3 'role':62 'say':8 'someon':33 'start':39 'stop':23 'thought':4 'usera@mylemmy.com':17,49 'usera@mynewlemmy.com':31"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1687324492
    +visibility: "visible             "
    +apId: "https://lemmy.world/post/356018"
    +editedAt: null
    +createdAt: DateTimeImmutable @1687293992 {#1641
      date: 2023-06-20 22:46:32.0 +02:00
    }
    +__isInitialized__: true
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1550 …}
  +image: null
  +parent: Proxies\__CG__\App\Entity\EntryComment {#1571 …}
  +root: Proxies\__CG__\App\Entity\EntryComment {#1589 …}
  +body: """
    > That is a vulnerability, albeit a small one.\n
    \n
    “Small one” is very wrong here. This is by far the largest gaping security hole in the whole specification.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1687334854 {#1709
    date: 2023-06-21 10:07:34.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@maggoats@lemmy.world"
    "@Setarkus@lemmy.world"
    "@fubo@lemmy.world"
  ]
  +children: Doctrine\ORM\PersistentCollection {#1591 …}
  +nested: Doctrine\ORM\PersistentCollection {#1590 …}
  +votes: Doctrine\ORM\PersistentCollection {#1553 …}
  +reports: Doctrine\ORM\PersistentCollection {#1662 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1565 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1564 …}
  -id: 1776
  -bodyTs: "'albeit':5 'far':18 'gape':21 'hole':23 'largest':20 'one':8,10 'secur':22 'small':7,9 'specif':27 'vulner':4 'whole':26 'wrong':13"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/835771"
  +editedAt: null
  +createdAt: DateTimeImmutable @1687334854 {#1614
    date: 2023-06-21 10:07:34.0 +02:00
  }
  +"title": 1776
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
7 DENIED edit
App\Entity\EntryComment {#1648
  +user: App\Entity\User {#264 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#1551
    +user: Proxies\__CG__\App\Entity\User {#2382 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1550 …}
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#2461 …}
    +slug: "Can-you-steal-a-user-s-identity-if-you-gain-their"
    +title: "Can you steal a user's identity if you gain their old domain name?"
    +url: null
    +body: """
      Just a random thought experiment. Let's say I have my account on a lemmy instance: `userA@mylemmy.com`. One day I decide to stop paying for the domain and move to `userA@mynewlemmy.com`, and someone else gains it and also starts up a lemmy instance.\n
      \n
      If they make their own `userA@mylemmy.com`, how do federated instances distinguish who's who?\n
      \n
      Have I misunderstood the role of domain names in this?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 4
    +favouriteCount: 2
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1687334854 {#1683
      date: 2023-06-21 10:07:34.0 +02:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#2456 …}
    +votes: Doctrine\ORM\PersistentCollection {#2453 …}
    +reports: Doctrine\ORM\PersistentCollection {#2454 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1737 …}
    +notifications: Doctrine\ORM\PersistentCollection {#1735 …}
    +badges: Doctrine\ORM\PersistentCollection {#1618 …}
    +children: [
      App\Entity\EntryComment {#1648}
    ]
    -id: 230
    -titleTs: "'domain':13 'gain':10 'ident':7 'name':14 'old':12 'steal':3 'user':5"
    -bodyTs: "'account':12 'also':38 'day':19 'decid':21 'distinguish':54 'domain':27,64 'els':34 'experi':5 'feder':52 'gain':35 'instanc':16,43,53 'lemmi':15,42 'let':6 'make':46 'misunderstood':60 'move':29 'name':65 'one':18 'pay':24 'random':3 'role':62 'say':8 'someon':33 'start':39 'stop':23 'thought':4 'usera@mylemmy.com':17,49 'usera@mynewlemmy.com':31"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1687324492
    +visibility: "visible             "
    +apId: "https://lemmy.world/post/356018"
    +editedAt: null
    +createdAt: DateTimeImmutable @1687293992 {#1641
      date: 2023-06-20 22:46:32.0 +02:00
    }
    +__isInitialized__: true
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1550 …}
  +image: null
  +parent: Proxies\__CG__\App\Entity\EntryComment {#1571 …}
  +root: Proxies\__CG__\App\Entity\EntryComment {#1589 …}
  +body: """
    > That is a vulnerability, albeit a small one.\n
    \n
    “Small one” is very wrong here. This is by far the largest gaping security hole in the whole specification.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1687334854 {#1709
    date: 2023-06-21 10:07:34.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@maggoats@lemmy.world"
    "@Setarkus@lemmy.world"
    "@fubo@lemmy.world"
  ]
  +children: Doctrine\ORM\PersistentCollection {#1591 …}
  +nested: Doctrine\ORM\PersistentCollection {#1590 …}
  +votes: Doctrine\ORM\PersistentCollection {#1553 …}
  +reports: Doctrine\ORM\PersistentCollection {#1662 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1565 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1564 …}
  -id: 1776
  -bodyTs: "'albeit':5 'far':18 'gape':21 'hole':23 'largest':20 'one':8,10 'secur':22 'small':7,9 'specif':27 'vulner':4 'whole':26 'wrong':13"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/835771"
  +editedAt: null
  +createdAt: DateTimeImmutable @1687334854 {#1614
    date: 2023-06-21 10:07:34.0 +02:00
  }
  +"title": 1776
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
8 DENIED moderate
App\Entity\EntryComment {#1648
  +user: App\Entity\User {#264 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#1551
    +user: Proxies\__CG__\App\Entity\User {#2382 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1550 …}
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#2461 …}
    +slug: "Can-you-steal-a-user-s-identity-if-you-gain-their"
    +title: "Can you steal a user's identity if you gain their old domain name?"
    +url: null
    +body: """
      Just a random thought experiment. Let's say I have my account on a lemmy instance: `userA@mylemmy.com`. One day I decide to stop paying for the domain and move to `userA@mynewlemmy.com`, and someone else gains it and also starts up a lemmy instance.\n
      \n
      If they make their own `userA@mylemmy.com`, how do federated instances distinguish who's who?\n
      \n
      Have I misunderstood the role of domain names in this?
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 4
    +favouriteCount: 2
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1687334854 {#1683
      date: 2023-06-21 10:07:34.0 +02:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#2456 …}
    +votes: Doctrine\ORM\PersistentCollection {#2453 …}
    +reports: Doctrine\ORM\PersistentCollection {#2454 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1737 …}
    +notifications: Doctrine\ORM\PersistentCollection {#1735 …}
    +badges: Doctrine\ORM\PersistentCollection {#1618 …}
    +children: [
      App\Entity\EntryComment {#1648}
    ]
    -id: 230
    -titleTs: "'domain':13 'gain':10 'ident':7 'name':14 'old':12 'steal':3 'user':5"
    -bodyTs: "'account':12 'also':38 'day':19 'decid':21 'distinguish':54 'domain':27,64 'els':34 'experi':5 'feder':52 'gain':35 'instanc':16,43,53 'lemmi':15,42 'let':6 'make':46 'misunderstood':60 'move':29 'name':65 'one':18 'pay':24 'random':3 'role':62 'say':8 'someon':33 'start':39 'stop':23 'thought':4 'usera@mylemmy.com':17,49 'usera@mynewlemmy.com':31"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1687324492
    +visibility: "visible             "
    +apId: "https://lemmy.world/post/356018"
    +editedAt: null
    +createdAt: DateTimeImmutable @1687293992 {#1641
      date: 2023-06-20 22:46:32.0 +02:00
    }
    +__isInitialized__: true
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1550 …}
  +image: null
  +parent: Proxies\__CG__\App\Entity\EntryComment {#1571 …}
  +root: Proxies\__CG__\App\Entity\EntryComment {#1589 …}
  +body: """
    > That is a vulnerability, albeit a small one.\n
    \n
    “Small one” is very wrong here. This is by far the largest gaping security hole in the whole specification.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1687334854 {#1709
    date: 2023-06-21 10:07:34.0 +02:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@maggoats@lemmy.world"
    "@Setarkus@lemmy.world"
    "@fubo@lemmy.world"
  ]
  +children: Doctrine\ORM\PersistentCollection {#1591 …}
  +nested: Doctrine\ORM\PersistentCollection {#1590 …}
  +votes: Doctrine\ORM\PersistentCollection {#1553 …}
  +reports: Doctrine\ORM\PersistentCollection {#1662 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1565 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1564 …}
  -id: 1776
  -bodyTs: "'albeit':5 'far':18 'gape':21 'hole':23 'largest':20 'one':8,10 'secur':22 'small':7,9 'specif':27 'vulner':4 'whole':26 'wrong':13"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/835771"
  +editedAt: null
  +createdAt: DateTimeImmutable @1687334854 {#1614
    date: 2023-06-21 10:07:34.0 +02:00
  }
  +"title": 1776
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
9 DENIED ROLE_ADMIN
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
10 DENIED ROLE_MODERATOR
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details