Security utilities

Local JWT Debugger for Mac and iOS

Decode and inspect JWTs while debugging authentication flows. Blissum keeps this utility local on macOS, iPhone, and iPad so you do not have to paste code, tokens, certificates, URLs, or private text into random online tools.

A private alternative to online jwt decoder tools

Paste a JWT and inspect the header JSON, payload JSON, signature, algorithm, and standard claims such as issuer, subject, audience, issued-at, not-before, expiration, and JWT ID. Blissum can auto-detect JWT-looking input and optionally verify HMAC signatures for HS256, HS384, and HS512 when you provide a secret. This is a local JWT decoder for authentication debugging, avoiding the common risk of pasting live tokens into online debugger sites.

Blissum groups everyday code, text, data, and web utilities into one local app for Mac, iPhone, and iPad, which is especially useful where iOS has fewer native developer-tool options.

Useful for

This page intentionally covers the practical ways people describe the same workflow, especially when they want a native, local, or offline option instead of a web-based tool.

Use JWT Debugger locally in Blissum

Download Blissum when you want this utility alongside other local developer tools for text, code, data, web, and security workflows on macOS, iPhone, and iPad.