logoalt Hacker News

mdavid626yesterday at 6:47 PM1 replyview on HN

How do you intercept network traffic on mac os? How do you fake certificates?


Replies

afshinmehyesterday at 7:04 PM

Zerobox creates a cert in `~/.zerobox/cert` on the first proxy run and reuses that. The MTIM process uses that cert to make the calls, inject certs, etc. This is actually done by the underlying Codex crate.

show 1 reply