Logging https requests and responses of Apple system processes

from blog The Desolation of Blog, | ↗ original
This is a follow-up to Catalina is checking notarization of unsigned executables. In that blog post, I explained how I was trying to compare packet traces of app notarization checks with packet traces of (apparent) shell script notarization checks. The traces looked the same. The request packets even had the exact same number of bytes. The only problem with the comparison was that the requests and responses use https and are thus encrypted. Is there a way of decrypting them?