the problem is it's too damn good. way too addictive and harmful
One of these other devs only noticed because the client sent a calendar invite to his real email, instead of the one provided by the impostor.
[edit - I'm reading through the original post, and I see now that this was all done through Upwork as well. Yikes!]
You need 'subterfuge and misdirection' in the sense that (as the world no-1 puts it), it's a semi-bluff...a weird/not-really-analysed position, but that will still end up in a draw if the opponent responds appropriately.
Lex: "Is there a sense in which it's ok to make sub-optimal moves?"
Magnus: "You HAVE to, because the best moves have been analysed to death, mostly."
Edit: The best one so far, replying to @POTUS: https://twitter.com/IYCKarnataka/status/1570126180791242753
What is broken is installing a custom CA into the system store on a rooted phone and making it work with all apps (apks) and Chrome.
If you install the custom CA into the user store it'll still work with Chrome.
If you want to use Charles to inspect the HTTPS traffic of an app you are developing then you continue to follow the instructions from https://www.charlesproxy.com/documentation/using-charles/ssl... to configure your test build to use the user store CA certs.
If you want to use Charles to inspect apps from other developers then you need to rebuild them to trust the user store just like you would if you were developing the app yourself. Use https://github.com/shroudedcode/apk-mitm to automate that process.
httptoolkit uses the method they do because it was the easiest way to get setup to inspect everything. Its tedious to get every app setup to trust the user store.
yep, that's what I do. still seems to work here though. I'm scared to reboot