Hacker News

From text to token: How tokenization pipelines work