This plugin can block malicious users and optimize the interface. It can also auto-expand sub-lists, video downloads!
This is a plugin that can completely solve the issue of explicit content tweets (pornographic tweets)!
When developing plugins related to personal information, some principles should be followed:
1. Personal information should not be stolen.
2. Data should not be controlled by anyone, and should not control anyone.
3. Even if the plugin is no longer maintained, the data should still be usable.
4. It should be decentralized, allowing everyone to publish and subscribe.
This plugin is exactly that! A pure client application with no servers involved; data is exchanged only through GitHub! Therefore, it is impossible to collect user information.
Features included:
One. Malicious Account Blocking
1. Can be used to block various malicious accounts and tweets, such as explicit content tweets, harassment tweets, bots, etc.
2. Will default to downloading a blacklist database of malicious accounts provided by the developer.
3. You can also subscribe to other trusted shared blacklist databases.
4. Will automatically update the blacklist data based on settings.
5. For content outside the blacklist, keyword blocking can be used.
6. Keyword blocking supports fuzzy matching and regular expressions.
7. All blocking operations have clear records and can be undone at any time.
8. You can search the list by keyword, category, certification, etc.
Two. Search Assistant
1. Can categorize and search tweets.
2. Can search for specific categories, languages, tweets with replies, and tweets with likes.
3. Can search within a specific time range or automatically locate tweets from a certain user's registration time.
4. You can search for specific users next to their profile pictures, including tweets where they replied to you or you replied to them.
5. In the search box, press Ctrl+Enter to search your own tweets.
Three. Account Tagging
1. Solves the problem of forgetting due to following too many users.
2. Tags are based on numeric IDs, so they remain valid even if a user changes their username.
3. Because tags are based on numeric IDs, they can also be used to track malicious users who change their names.
4. Tags can have labels added to them.
5. Notes can be added.
Four. Data Sharing
1. All account actions and user tags can be backed up to GitHub.
2. Data can be shared by giving others access permissions.
3. If the repository is made public, custom list libraries can be published.
4. Blacklist libraries, whitelist libraries, user tag libraries, keyword rules, etc., can be published.
Five. Access Optimization
1. "Discover more" can be removed.
2. More replies can be automatically expanded.
3. Advertisements can be blocked.
4. Invalid content can be cleaned up, hiding unsightly marks left in the body of the tweet.
Six. Download Assistant
1. Videos in tweets can be directly downloaded.
2. Original images from tweets can be downloaded.
3. If there are multiple images and videos, they will be downloaded together.
4. Downloaded videos and images will be automatically named based on the tweet content.