No, not at all. The request never hits the cache. The certificate is stored within the app and all internet communication is specifically pinned to said certificate. It doesn’t even ask your certificate store.
No, not at all. The request never hits the cache. The certificate is stored within the app and all internet communication is specifically pinned to said certificate. It doesn’t even ask your certificate store.
MigratingtoLemmy@lemmy.world 1 year ago
I see. Thanks, I’ll have to rethink the idea in that case.
stifle867@programming.dev 1 year ago
Yeah, unfortunately it’s a huge barrier if you’re wanting to see why your devices are phoning home and the data being sent. It makes it extremely difficult if not impossible for most people to bypass.
MigratingtoLemmy@lemmy.world 1 year ago
I understand. What other methods would you suggest to be able to snoop on/decrypt the traffic from my device?
stifle867@programming.dev 1 year ago
Specifically for attempting to bypass certificate pinning you’re solidly in the realm of reverse engineering. I haven’t attempting it myself but I have read the efforts of others over the years and the process was quite evolved and ever changing. If you are interested in going down this rabbit hole you may use these links as starting points but be prepared to adapt them.
…medium.com/uncertify-a-tool-for-recompiling-andr…
frida.re
codeshare.frida.re/browse
Best of luck.