@the-convocation/twitter-scraper 0.19.0 → 0.20.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -172,7 +172,7 @@ const scraper = new Scraper({
172
172
 
173
173
  In some cases, Twitter's authentication endpoints may be protected by Cloudflare's advanced bot detection, resulting in `403 Forbidden` errors during login. This typically happens because standard Node.js TLS fingerprints are detected as non-browser clients.
174
174
 
175
- To bypass this protection, you can use the optional CycleTLS integration, which uses golang to mimic Chrome browser TLS fingerprints:
175
+ To bypass this protection, you can use the optional CycleTLS `fetch` integration to mimic Chrome browser TLS fingerprints:
176
176
 
177
177
  **Installation:**
178
178
 
@@ -199,9 +199,9 @@ await scraper.login(username, password, email);
199
199
  cycleTLSExit();
200
200
  ```
201
201
 
202
- **Note:** The `/cycletls` entrypoint is Node.js only and will not work in browser environments. It's provided as a separate optional entrypoint to avoid bundling golang dependencies in environments where they cannot run.
202
+ **Note:** The `/cycletls` entrypoint is Node.js only and will not work in browser environments. It's provided as a separate optional entrypoint to avoid bundling binaries in environments where they cannot run.
203
203
 
204
- See the [cycletls-cloudflare example](./examples/cycletls-cloudflare/) for a complete working example.
204
+ See the [cycletls example](./examples/cycletls/) for a complete working example.
205
205
 
206
206
  ### Rate limiting
207
207
  The Twitter API heavily rate-limits clients, requiring that the scraper has its own