Game Development Reference
Time (US & Canada)","followers_count":6989945,"screen_
to_status_id":null," text ":"Joey Roth's stuff is legit
20 20:32:47 +0000
It was designed as a human-readable text data interchange standard.
Although it's difficult to make immediate sense of it by just looking at
Listing 8.8 (because it is standardized), computer algorithms can be
written to extract data into a more meaningful format. Messages in JSON
are in the format key : data. To find messages typed in by Ashton among
the other text, the key “ text ” is searched for and the following text in
double quotes is the actual message. For the reader's benefit, the key “ text ”
has been typed in bold in Listing 8.8 after which you will find the message.
Posting messages to Twitter on behalf of a user is much more complex.
There are three authentication steps to which you need to adhere.
The first step is to send Twitter a message from your application asking
for permission to access the user's account. The user's Web browser then
opens, asking them if it is ok for the application they are using to access
the Twitter account. If the user permits this access he or she receives a PIN
number. The user enters this PIN number into the application. Following
this, the application sends another message to Twitter telling it that it
has the PIN. Once Twitter determines that this PIN is correct, it sends
personalized authority tokens back to the application. These tokens can be
stored inside the application so that the user doesn't have to go through
the authorization process again. With the tokens, the application can post
tweets to the user's Twitter account.
The authorization process and sending tweets from a Unity application are
examined in the next workshop.