Well, not this one. But this one is! How? Let’s take a closer look at Bluesky and the AT Protocol that underpins it.
Note: I communicated with the Bluesky team prior to the publishing of this post. While the functionality described is not the intended use of the application, it is known behavior and does not constitue a vulnerability disclosure process. My main motivation for reaching out to them was because I like the folks and don’t want to make their lives harder.