Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
koevet
on Feb 19, 2014
|
parent
|
context
|
favorite
| on:
How I was able to track the location of any Tinder...
The article states "By proxying iPhone requests...".
I don't see how the attacker can read the JSON payload if SSL is used. Am I missing something?
aetch
on Feb 19, 2014
[–]
The attacker "is" the iPhone in this situation. The attacker creates his own requests and has the server talk to him in order to gain location info.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
I don't see how the attacker can read the JSON payload if SSL is used. Am I missing something?