There’s long been a development tool called “Charles” and in simple terms (as I understand it for you readers, not developers) it’s a way to see what you are sending over the network from software projects you are developing. Think of it as a way to debug where the problem lies in a piece of software (am I sending the wrong data, to the wrong place, or everything from the app is fine). Just a bit ago Charles Proxy came out for iOS, and it’s pretty amazing and terrifying at the same time.
What [Charles for iOS](https://itunes.apple.com/us/app/charles-proxy/id1134218562?mt=8&uo=4&at=1l3v36d) allows you to do is to create a *local* VPN proxy, which sends all your network traffic on your device through the Charles app — thus allowing it to see everything sent, and record that for you. This data doesn’t leave your device, it’s not some remote server providing the logs, it’s all local. This is kind of like running Little Snitch on your Mac, except it’s a log and not a tool you can use to block stuff.
You must be a member to read the rest of this article.
Note: This site makes use of affiliate links, which may earn the site money when you buy using those links.