понедельник, 30 марта 2026 г.

Decompiling the White House’s new app

Last week the US White House released an app on the App Store and Google Play.  “Unparalleled access to the Trump Administration.” the release said.

People became alarmed when the app requests to bypass security, asking for location and much more.

Thereallo jumped in and did some reverse engineering to see what it does.

The official White House Android app has a cookie/paywall bypass injector, tracks your GPS every 4.5 minutes, and loads JavaScript from some guy’s GitHub Pages.

It’s a content portal. News, live streams, galleries, policy pages, social media embeds, and promotional material for administration initiatives. All powered by WordPress.
It hides:
  • Cookie banners
  • GDPR consent dialogs
  • OneTrust popups
  • Privacy banners
  • Login walls
  • Signup walls
  • Upsell prompts
  • Paywall elements
  • CMP (Consent Management Platform) boxes
It forces body { overflow: auto !important } to re-enable scrolling on pages where consent dialogs lock the scroll.
An official United States government app is injecting CSS and JavaScript into third-party websites to strip away their cookie consent dialogs, GDPR banners, login gates, and paywalls.
Read the entire details on the blog post here.


from Adafruit Industries – Makers, hackers, artists, designers and engineers! https://ift.tt/K68fQX5
via IFTTT

Комментариев нет:

Отправить комментарий

Know us

Our Team

Tags

Video of the Day

Contact us

Имя

Электронная почта *

Сообщение *