We Intercepted the White House App's Network Traffic. Here's What It Sends.
This is a follow-up to our static analysis of the White House iOS app. In that post, we decompiled the app and documented what the code could do. Critics fairly pointed out that compiled code doesn’t mean active code.
So we set up a MITM proxy and watched what the app actually sends.
Setup
We installed mitmproxy on a Mac, configured an iPhone to route traffic through it, and installed the mitmproxy CA certificate on the device. Then we opened the White House app (v47.0.4, build 81) and browsed e...
Read more at atomic.computer