> Most of these checks seem designed to avoid infecting devices under active observation by security researchers. The validation also involves a rudimentary location check designed to avoid targeting American and Israeli devices<p>Isn't this a possible indication of who / what is behind this effort? Doesn't this say more than evaluating the X account that was sharing the links?