Work

AppTraffic — mobile network forensics, usable by non-engineers

A browser-operated platform that gives privacy and platform-studies researchers live access to the network traffic of any Android or iOS app — without a networking background.

2020–2024 ·Software engineer · University of Siegen ·Security, Data

A tool for the other end of the APK analysis pipeline — what’s on the wire, not what’s in the binary.

Between 2020 and 2024, at the SFB 1187 “Media of Cooperation” (University of Siegen), I built AppTraffic. Pick a mobile app in a browser; it runs inside a disposable sandbox device; every network request it makes is captured, TLS-terminated bodies included. No tcpdump, no mitmproxy on the researcher’s laptop, no Wireshark tutorial.

AppTraffic is the sibling of AppInspect. AppInspect: what is in the code. AppTraffic: what happens when it runs.

The problem

Standard mobile-traffic analysis is a seven-step workflow: install an HTTPS interceptor, trust a custom CA on the device, bypass certificate pinning, route traffic through a VPN, capture, decode, search. Every step filters out researchers whose expertise is in what they are looking for, not the tooling.

AppTraffic collapses that to: log in, pick an app, press a button, watch requests come in.

Architecture

AppTraffic simplified network diagram: browser → VPN → sandbox device → MITMProxy → app stores
Three-tier architecture: sandbox, session, query. Diagram by Jason Chao, University of Siegen.
  • Sandbox — a pool of Dockerised Android environments (custom root CA, MITMProxy HTTPS interceptor, VPN route). iOS runs on physical devices; simulators cannot route real App Store traffic.
  • Session — per-researcher SoftEther VPN terminations keyed to browser identity. Session state in Redis.
  • Query — captured flows in MongoDB, filterable by host, endpoint, method, body substring, or time window. Export as JSON, PCAP, or CSV.
AppTraffic traffic routing: every request from the sandboxed app flows through the per-session MITMProxy before reaching its destination
Every request from the sandboxed app passes through the per-session MITMProxy before leaving the lab network. Diagram by Jason Chao, University of Siegen.

Horizontal scaling on the sandbox tier is what keeps costs sane: a Digital Methods Initiative Winter School may mean 40 concurrent sessions on Tuesday and zero on Friday.

The UI, the load-bearing part

AppTraffic sessions list in the browser UI — each captured session is named, timestamped, and downloadable
Sessions are the unit of analysis — named, shareable, downloadable. Screenshot from the AppTraffic research UI.
Live capture view: requests from a Reddit session appearing as they happen, with full URLs and method labels
Live capture of a Reddit session — requests appear as the app makes them. Screenshot from an AppTraffic workshop session, 2021.

Why SoftEther, not WireGuard

A reasonable peer-review question. SoftEther tunnels over HTTPS and works unmodified from networks that filter UDP. Researchers on institutional Wi-Fi regularly hit those filters. WireGuard is cleaner to operate; SoftEther is harder to block.

Impact

  • Used by researchers from 8+ European universities — many from non-technical disciplines (media studies, platform studies, digital sociology). Adoption grew through the Digital Methods Initiative teaching programme (Winter / Summer Schools), not procurement: the tool demands no networking or systems-engineering background, which was the explicit design goal.
  • Presented at RSECon 2023.
  • Empirical spine of several doctoral dissertations at SFB 1187.

Publications

Methodology and digital-methods application of AppTraffic appear in:

Chao, J., van Geenen, D., Gerlitz, C. & van der Vlist, F. N. (2024). Digital methods for sensory media research: Toolmaking as a critical technical practice. Convergence: The International Journal of Research into New Media Technologies, 30(1), 236–263. https://doi.org/10.1177/13548565241226791

Pilipets, E. & Chao, J. (2025). Noise in sonic social media: Memetic soundscapes of Deep TikTok. New Media & Society. https://doi.org/10.1177/14614448251358752

Omena, J. J., Lobo, T., Tucci, G., Bitencourt, E., de Keulenaar, E., Kerche, F. W., Chao, J., Liedtke, M., Li, M., Paschoal, M. L. & Lavrov, I. (2024). Quali-quanti visual methods and political bots: A cross-platform study of pro- & anti-bolsobots. Journal of Digital Social Research, 6(1), 50–73. https://doi.org/10.33621/jdsr.v6i1.215


AppTraffic was built at the SFB 1187 “Media of Cooperation”, University of Siegen. Project page: apptraffic.phil.uni-siegen.de.