The pop-up that says "this new branch, wanna PR it?" that's handy, which leads to the auto-selection of the branch as part of the PR.
How are you going to have the client have the decryption key without Burp intercepting that?
Hello everyone, is there a way to implicitly access scope from within a function defined within mathjs? Eg: math.eval('a("hello")', { a: (b) => { return b + this.c; }, c: 'wor...
The security team seriously recommended you implment JS-side security to fix that?
How are you not going to have Burp just send data back post-decryption?
Then again if you're hourly, spend months on it, who cares? lol
Signatures? But that requires pre-installed keys.
Did they explain specific ciphers to use?
why are you trying to defeat Burp?