It’s a very familiar behavior pattern, so if we can know what is trending as disinformation on the LINE, end-to-end encrypted system, then we have noticed of what disinformation operators is about to use, basically, because they source their material from there also.