From text to token: How tokenization pipelines work | Dark Hacker News