From memory, the only real tricky thing is hijacki...
# social
m
From memory, the only real tricky thing is hijacking the requests, from there the rest should be fairly easily portable.