I Decompiled the White House's New App

This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).

A developer decompiled the official White House Android app using ADB and JADX, uncovering several concerning behaviors. The app injects JavaScript into every third-party website opened via its in-app browser to strip cookie consent dialogs, GDPR banners, and paywalls. It contains a full GPS tracking pipeline via the OneSignal

8m read timeFrom thereallo.dev
Post cover image
Table of contents
What Is This App?Expo ConfigWhat the App Actually DoesConsent/Paywall Bypass InjectorLocation Tracking InfrastructureOneSignal User ProfilingSupply Chain: Loading JS From Some Guy's GitHub PagesSupply Chain: Elfsight Widget PlatformSupply Chain: Everything ElseNo Certificate PinningDevelopment Artifacts in ProductionPermissionsFull SDK ListRecap

Sort: