I found this material on the network, thought it was pretty good, so I saved it. The handling of string interception inside actually coincides with my own previous approach, haha, which made me quite happy.