We’re working on our own series about how to effectively use Charles Proxy to track down malicious ads.

There is a wonderful and comprehensive series of posts from Ad Ops Insider.

One of the fabulous things about Charles Proxy is that it allows you to inspect SSL traffic by installing a custom certificate. However, if you’ve ever tried to hunt down a mobile redirect that only affects users arriving from the Facebook app, you might have discovered that you can’t decrypt every kind of SSL traffic. Newer iOS apps use “certificate pinning”, which prevents exactly the technique that Charles exploits. If you run into this situation, there is a workaround (that we haven’t tried yet). It’s a deep technical dive and it can be found here:


Drop Us a Line

We’re dedicated to working with the hungriest minds in our field. If you’re involved with digital content production or digital advertising and marketing, we’d love to hear from you. Big, small, experienced or beginner, please feel free to get in contact if you think we can be of service.

Say Hello