Understanding Certificate Transparency in Mobile apps and How it Affects Traffic Proxying

I am familiar with the basics of CT and certificate pinning. However, I’m failing to understand how CT properly replaces pinning in mobile apps in a scenario in which, for example, an attacker steals a device or downloads the application f… Continue reading Understanding Certificate Transparency in Mobile apps and How it Affects Traffic Proxying