Recently, a lot of reverse engineering. I’ve been writing them up on my blog, so there’s a growing list of technical deep dives from this year: around Letterboxd with mitmproxy[0], iOS Shortcuts deeplinks[1], the QR codes for Fitness SF[2], and binary patching some non-open source code[3]. Hopefully followable even if you don’t have as much debugging or reverse engineering experience.
[0]: https://blog.alexbeals.com/posts/extracting-letterboxd-token...
[1]: https://blog.alexbeals.com/posts/reverse-engineering-ios-dee...
[2]: https://blog.alexbeals.com/posts/debugging-fitness-sf-qr
[3]: https://blog.alexbeals.com/posts/start-process-extensions