Too Long; Didn't Read
<em>Author Note: This write-up will not examine any new vulnerability. Rather, it explores a common methodology used in trivially </em><a href="https://hackernoon.com/tagged/hacking" target="_blank"><em>hacking</em></a><em> iOS apps, in which you perform a man-in-the-middle (MitM) attack on yourself.</em>