It is very important that Americans vote in the upcoming election. If you’ve voted, tag your post #IVoted!
MLTSHP
  • Popular
  • Join us! Sign up to post images and create your own shake.
    Sign Up!
  • sign in

The official White House app is unethical (well duh..)

Recap
The official White House Android app:
1. Injects JavaScript into every website you open through its in-app browser to hide cookie consent dialogs, GDPR banners, login walls, signup walls, upsell prompts, and paywalls.
2. Has a full GPS tracking pipeline compiled in that polls every 4.5 minutes in the foregrOund and 9.5 minutes in the background, syncing lat/lng/accuracy/timestamp to OneSignal's servers.
3. Loads JavaScript from a random person's GitHub Pages site (lonelycpp.github. io ) for YouTube embeds. If that account is compromised, arbitrary code runs in the app's WebView.
4. Loads third-party JavaScript from Elfsight (elfsightcdn. com/platfo rm.js) for social media widgets, with no sandboxing.
5. Sends email addresses to Mailchimp, images are served from Uploadcare, and a Truth Social embed is hardcoded with static CDN URLs. None of this is government infrastructure.
6. Has no certificate pinning. Standard Android trust management.
7. Ships with dev artifacts in production. A localhost URL, a developer IP ( 10.4.4. 109 ), the Expo dev client, and an exported Compose PreviewActivity.
8. Profiles users extensively through OneSignal- tags, SMS numbers, cross-device aliases, outcome tracking, notification interaction logging, in-app message click tracking, and full user state observation.
Is any of this illegal? Probably not. Is it what you'd expect from an official government app? Probably not either.
alt text
Recap
The official White House Android app:
1. Injects JavaScript into every website you open through its in-app browser to hide cookie consent dialogs, GDPR banners, login walls, signup walls, upsell prompts, and paywalls.
2. Has a full GPS tracking pipeline compiled in that polls every 4.5 minutes in the foregrOund and 9.5 minutes in the background, syncing lat/lng/accuracy/timestamp to OneSignal's servers.
3. Loads JavaScript from a random person's GitHub Pages site (lonelycpp.github. io ) for YouTube embeds. If that account is compromised, arbitrary code runs in the app's WebView.
4. Loads third-party JavaScript from Elfsight (elfsightcdn. com/platfo rm.js) for social media widgets, with no sandboxing.
5. Sends email addresses to Mailchimp, images are served from Uploadcare, and a Truth Social embed is hardcoded with static CDN URLs. None of this is government infrastructure.
6. Has no certificate pinning. Standard Android trust management.
7. Ships with dev artifacts in production. A localhost URL, a developer IP ( 10.4.4. 109 ), the Expo dev client, and an exported Compose PreviewActivity.
8. Profiles users extensively through OneSignal- tags, SMS numbers, cross-device aliases, outcome tracking, notification interaction logging, in-app message click tracking, and full user state observation.
Is any of this illegal? Probably not. Is it what you'd expect from an official government app? Probably not either.
Source: https://blog.thereallo.dev/blog...

I thought this would be of interest to some...
15 hours ago

Joffaboy pro

  • 301 Views
  • 1 Save
  • 15 Likes

Post URL

https://mltshp.com/p/1RN1R

In These Shakes

  • Joffaboy
  • Post to Facebook
  • Post to Tumblr
m3moellering 13 hours ago
Those EULA’s are long and complicated for a reason.
ardgedee pro 12 hours ago
"Is it what you'd expect from an official government app? [Probably not either.|What year is this?]"
0y3ahSansAcut3 12 hours ago
@ardgedee 1984.

Follow @best_of_mltshp on Mastodon

Are you a developer? Check out our API.

© MLTSHP, a Massachusetts Mutual Aid Society venture All Rights Reserved

  Terms of Use   Code of Conduct   Contact Us

Follow The MLTSHP User!