Currently, the only option to intercept and decrypt secure traffic is to install and trust the Fiddler root CA. However, some applications might use different variations of cert pinning, which can be "solved" by creating and using a self-signed certificate. This would also be a viable option for testers of secured applications (that have access to the actually pinned cert).
Suggestions: provide an option for passing a custom self-signed certificate that Fiddler can use instead of the Fiddler root CA.
Related to https://stackoverflow.com/questions/42236967/change-the-root-signing-certificate-used-by-fiddler
Requested through t.1676901