Don't know how many of you use curl to access potentially malicious links. If you do, upgrade or grab the header first (-I dash uppercase I as in Idaho) to avoid this and look at the returned Location field to make sure that it is not using a mail protocol like pop3.
I usually grab the header first since 9 out of 10 times the malicious link redirects to a page with an exploit kit on it. In that case, I would immediately be suspicious of the redirect being to a mail protocol.
It's easy to feel confident and skip that step and just grab the full HTML since you are getting text in Linux and pretending to be John Doe with IE8 clicking the link from a gmail message
Now it looks like the joke may be on you.