logoalt Hacker News

I decompiled the White House's new app

415 pointsby amarcheschiyesterday at 3:37 PM153 commentsview on HN

Comments

iancarrollyesterday at 4:48 PM

A bit skeptical of how this article is written as it seems to be mostly written by AI. Out of curiosity, I downloaded the app and it doesn't request location permissions anywhere, despite the claims in the article.

I've noticed Claude Code is happy to decompile APKs for you but isn't very good at doing reachability analysis or figuring out complex control flows. It will treat completely dead code as important as a commonly invoked function.

show 6 replies
gdeglintoday at 3:31 AM

OneSignal cofounder here. Posting since our service was mentioned in this article.

For those concerned or curious about location data collection, we wrote an explanation of how it works: https://onesignal.com/blog/youre-in-control-how-location-act...

show 1 reply
SoftTalkeryesterday at 4:21 PM

Looks like what you might expect in a standard marketing app from a consultancy. They probably hired someone to develop it, that shop used their standard app architecure which includes location tracking code and the other stuff.

show 5 replies
somehnguyyesterday at 4:13 PM

Interesting. The site is nearly unusable to me unfortunately. '19 MBP w/ Chrome - scrolling stutters really bad

show 5 replies
r4indeeryesterday at 4:23 PM

The argument regarding no certificate pinning seems to miss that just because I might be on a network that MITM's TLS traffic doesn't mean my device trusts the random CA used by the proxy. I'd just get a TLS error, right?

show 3 replies
julianlamyesterday at 11:51 PM

This site makes my browser choke.

Reader mode was the only thing that made it readable.

reactordevyesterday at 11:20 PM

Violating the law is what the White House is all about these days.

1e1ayesterday at 10:49 PM

This website is quite GPU intensive when scrolling.

AnonyMDtoday at 2:18 AM

If this is true, it would be a symbolic event marking the disappearance of freedom, a source of pride for the United States.

sitzkriegyesterday at 4:22 PM

i assumed it was malware out the gate. yep

wnevetsyesterday at 11:50 PM

> That's a personal GitHub Pages site. If the lonelycpp GitHub account gets compromised, whoever controls it can serve arbitrary HTML and JavaScript to every user of this app, executing inside the WebView context.

I was promised a meritocracy and non stop winning. When do those begin?

drnick1today at 2:26 AM

> An official United States government app is injecting CSS and JavaScript into third-party websites to strip away their cookie consent dialogs, GDPR banners, login gates, and paywalls.

I wouldn't run a non-free government app on my phone, but this seems a positive. It's basically what uBlock does.

nine_kyesterday at 5:53 PM

> An official United States government app is injecting CSS and JavaScript into third-party websites to strip away their cookie consent dialogs, GDPR banners, login gates, and paywalls.

So at least it does something actually beneficial for the user! I wish it could go even further, the way Reader Mode in a browser would go.

vineyardmikeyesterday at 4:15 PM

> The official White House Android app has a cookie/paywall bypass injector, tracks your GPS every 4.5 minutes (9.5m when in background), and loads JavaScript from some guy's GitHub Pages (“lonelycpp” is acct, loads iframe viewer page).

Doesn’t seem too crazy for a generic react native app but of course coming from the official US government, it’s pretty wide open to supply chain attacks. Oh and no one should be continually giving the government their location. Pretty crazy that the official government is injecting JavaScript into web views to override the cookie banners and consent forms - it is often part of providing legal consent to the website TOS. But legal consent is not their strong suit I guess.

show 1 reply
oefrhayesterday at 4:10 PM

> An official United States government app is injecting CSS and JavaScript into third-party websites to strip away their cookie consent dialogs, GDPR banners, login gates, and paywalls.

Giving people a taste of web with Ublock Origin annoyance filters applied, refreshing. Can’t believe orange man regime is doing one thing right.

post-ityesterday at 4:55 PM

> An official United States government app is injecting CSS and JavaScript into third-party websites to strip away their cookie consent dialogs, GDPR banners, login gates, and paywalls.

Rare Trump administration W. I'm assuming there's one particular website they open in the app that shows a cookie popup, and this was a dev's heavy-handed way of making that go away.

Arainachyesterday at 4:09 PM

"An official United States government app is injecting CSS and JavaScript into third-party websites to strip away their cookie consent dialogs, GDPR banners, login gates, and paywalls."

In their defense, this is the first thing the Trump admin has done that's unambiguously positive for ordinary people.

show 3 replies
andixyesterday at 5:35 PM

I would've expected worse. :)

somebudyelseyesterday at 5:42 PM

The only permissions on the play store are notifications. On data privacy, it only shows optional email or phone number. Respectfully, I call BS.

replwoacauseyesterday at 4:27 PM

lol honestly all of this tracks given the current administration. i'm actually surprised it isn't worse. but yeah, amateur hour for sure.

show 1 reply
orthogonalinfotoday at 3:27 AM

[dead]

alcor-ztoday at 1:39 AM

[dead]

pugchatyesterday at 8:16 PM

[dead]

iam_circuityesterday at 7:28 PM

[dead]

enigmaTestyesterday at 9:04 PM

[flagged]

show 1 reply
razkaplanyesterday at 8:44 PM

[flagged]

show 1 reply
trimethylpurineyesterday at 4:22 PM

I don't see what the fuss is about. This all looks pretty standard. I use random people's stuff all the time. Isn't that the point of open source?

Did you find something malicious in the random GitHub repo? If so, you should write an article about that instead.

show 5 replies
crimshawzyesterday at 7:33 PM

you are a fucking genius

analog31yesterday at 6:42 PM

>>> This is a government app loading code from a random person's GitHub Pages.

A random person with pronouns, no less. That means the code is “woke.”

show 2 replies
ranzhhyesterday at 6:29 PM

Are those references to 45 and 47 "Easter Eggs" to Trump's presidency number(s)? As in, forty-five-press (45th president) and Version 47.x.x (47th president), as well as the text message hotline (45470).

jruzyesterday at 6:24 PM

Is this a surprise to anyone?

ThaFreshyesterday at 4:44 PM

nice work, so they can get your location and have ICE scoop you up if required

colesantiagoyesterday at 4:07 PM

This is a pretty standard decomplation of an Android app.

I am sure if you decompile other apps used by hundreds of thousands of people, you would find all sorts of tracking in there.

Thanks for helping the White House improve their app security for free though.

show 1 reply
longislandguidoyesterday at 4:57 PM

The comments in here are pretty rich. If this was any other app, everyone would be screaming about "why are you being mean to the author", flagging posts left and right.

show 4 replies
periodjetyesterday at 8:18 PM

> Is it what you'd expect from an official government app? Probably not either.

Since when is the government a slick and efficiently run outfit that produces secure and well-done software products? Does no one remember the original Obamacare launch?

It’s hard to imagine a smug article like this dissecting a product of some other administration. There’s something very weird and off about stuff like this.

show 3 replies