← Back to context Comment by nickburns 1 year ago The traffic would obviously be encrypted. Obviously. 2 comments nickburns Reply simonw 1 year ago So modify the application binary to swap out the certificate in order to spy on the traffic. Difficult, but not impossible. nickburns 1 year ago You're just saying words.
simonw 1 year ago So modify the application binary to swap out the certificate in order to spy on the traffic. Difficult, but not impossible. nickburns 1 year ago You're just saying words.
So modify the application binary to swap out the certificate in order to spy on the traffic. Difficult, but not impossible.
You're just saying words.