Aditya Dixitblog.dixitaditya.com·Dec 3, 2022Manipulating AES Traffic using a Chain of Proxies and Hardcoded KeysOverview Mobile applications are becoming more resilient to reverse engineering and tampering with all kinds of client and server-side protections, binary hardening, code obfuscations, SSL pinning, etc which makes it that much more difficult for good...11 likes·7.2K readsSecurityAdd a thoughtful commentNo comments yetBe the first to start the conversation.