📰 2026-04-01 11:00 更新
🔸 We intercepted the White House app’s traffic. 77% of requests go to 3rd parties / 我们拦截了白宫应用程序的流量。77%的请求转发给第三方
🔗 We intercepted the White House app’s traffic. 77% of requests go to 3rd parties
🔥 55 points
原文:
This is a follow-up to our static analysis of the White House iOS app. In that post, we decompiled the app and documented what the code could do. Critics fairly pointed out that compiled code doesn’t mean active code. So we set up a MITM proxy and watched what the app actually sends. Setup We installed mitmproxy on a Mac, configured an iPhone to route traffic through it, and installed the mitmproxy CA certificate on the device. Then we opened the White House app (v47.0.4, build 81) and browse…
译文:
这是我们对白宫iOS应用程序静态分析的后续行动。在那篇文章中,我们对应用程序进行了反编译,并记录了代码的功能。批评者公平地指出,编译的代码并不意味着活动代码。因此,我们设置了一个MITM代理,并观看了应用程序实际发送的内容。安装我们在Mac上安装了mitmproxy ,配置了iPhone以路由流量,并在设备上安装了mitmproxy CA证书。然后我们打开了 白宫应用程序( v47.0.4 , build 81 )和浏览…
自动更新 · 正文抓取 · 双语翻译