How to get URL link on X (Twitter) App

I want to make sure it's clear that storing credit card numbers in plain text in a "reviewData" field is maybe used for fraud and abuse, potentially for the Twitter ads fraud and abuse vendor Sift which you agree to share data with. But the data is stored on Twitter's side.👀🥵🌩️ 
https://twitter.com/felixsalmon/status/1562072827951464451First up... folks have known for awhile that tons of Chinese advertisers were/are buying Twitter ads... But no one had pieced it together that those Chinese advertisers would be using ***Twitter Custom Audiences to doxx VPN users who verified with real contact info...** 🚨🥵🥵🚨
https://twitter.com/AlexAzziNBC/status/1507475401890799620ICYMI in April 2022 the PWHPA decided to *not* move forward w/ a partnership w/ the PHF due to the connections to Yandex Chair John Boynton, "It’s believed Boynton will be an issue when it comes to attracting major sponsors moving forward." 🧐🌩️⚖️👏🏻👏🏻👏🏻
This is going to be a complex product to audit how it performs / users are impacted, and while I'm a big fan of "easy deployments" - I can only imagine what would happen if this process for "auto ads will then scan your site and automatically place ads" went a little wrong.😅🥵


https://twitter.com/SamuelStolton/status/1451560529898741764Facebook had minimum spends & quotas via Facebook's header bidding. Google considered a "nuclear option" of reducing Google's exchange fees down to zero to kill header bidding.
https://twitter.com/bokelley/status/1405568632244125697
First, BOK's old company used to own the domain facilitating these data flows "adnxs.com" - this domain was used in the Ad ID Consortium & was the most popular. AT&T bought appnexus, pulled out of the AD ID C, & seemingly "gave the domain up"
All initial email address payloads are *encoded in base64* - no encryption as emails are sent from a UID 2.0 vendor/website/app participating in this data breach scheme now housed as "open source" and controlled by the IAB Tech Lab.