Return to Article Details Interception of traffic in mobile applications Download Download PDF