From 901d30287ac2082dc40d66f94b83799756479c65 Mon Sep 17 00:00:00 2001 From: Philipp Schaefer Date: Wed, 17 Apr 2013 00:13:39 +0200 Subject: [PATCH] fixed typo --- mobile/HACKING.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mobile/HACKING.md b/mobile/HACKING.md index cfa2a9ae..76d8d54e 100644 --- a/mobile/HACKING.md +++ b/mobile/HACKING.md @@ -1,7 +1,7 @@ How does this basically work? ----------------------------- -At the moment, the Android App is a WebView which renders the normal web page. The IITC script is injected by calling the ```iitc_view.loadIITC_JS(Context)```. The app uses a local version of the script, which is located in the assets folder, if no external source is given (see "pref\_iitc\_source"). +At the moment, the Android App is a WebView which renders the normal web page. The IITC script is injected by calling ```iitc_view.loadIITC_JS(Context)```. The app uses a local version of the script, which is located in the assets folder, if no external source is given (see "pref\_iitc\_source"). Communication from app to script is handled by loading Javascript function calls. For example: ```iitc_view.loadUrl("javascript: window.goBack();");```