Researcher reveals official White House app is one command away from tracking your precise location every 4.5 minutes app can also inject code to dodge cookie consent, GDPR banners, and paywalls
Date:
Wed, 06 May 2026 17:25:00 +0000
Description:
White House app contains code to hide cookie options, GDPR banners, and paywalls - and collects extensive user data
FULL STORY ======================================================================Copy link Facebook X Whatsapp Reddit Pinterest Flipboard Threads Email Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Newsletter Subscribe to our newsletter An analysis of the official White House app has revealed some concerning features The app is capable of blocking cookie consent options, GDPR banners, and paywalls The app can track user's precise location every 4.5 minutes, and sends user data to non-governmental infrastructure A security researcher has decompiled the new official White House app for Android that was released in March 2026, and has found some concerning features hidden inside.
Web developer Thereallo analyzed the apps APK in a blog post and found it is capable of injecting code into third-party websites to hide cookie consent popups, GDPR banners, paywalls, and more. It can also track your accurate GPS location every 4.5 minutes, pulls code from unsecured non-government infrastructure, and provides highly invasive profiling of every user. Article continues below You may like FBI urges users not to download Chinese mobile apps over privacy risks Workplace apps gathering far more personal data than we all think The EUs age verification app has a privacy problem and it may
be more than just a 'bug in an app' 'A direct line to the White House' When the White House released the new app, it said it offers Americans a direct line to the White House, but it looks more likely that the reverse is true.
Hidden inside the WebView used for opening external websites is a JavaScript snippet that has the ability to hide some fairly vital information typically displayed when you visit a website.
An official United States government app is injecting CSS and JavaScript into third-party websites to strip away their cookie consent dialogs, GDPR
banners, login gates, and paywalls, Thereallo explained.
Blocking these core website functions means that users subject to GDPR or state-level privacy laws cannot exercise their legal right to opt-out of tracking. Furthermore, by circumventing paywalls, the US government is providing users with the ability to access content that is typically
protected with a paywall. Are you a pro? Subscribe to our newsletter Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features
and guidance your business needs to succeed! Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners or sponsors By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over. (Image credit: Google Play Store) The Google Play Store listing states that the app can request approximate and precise location data, with Thereallo noting that the app requests location permission at runtime, and that the app contains an Expo plugin intended to strip location tracking. But the app instead relies on OneSignal SDKs location tracking code.
The app can therefore collect accurate location tracking information every
4.5 minutes when the app is active, and every 9.5 minutes when the app is running in the background. While this tracking isnt active by default, the entire process can be activated with a single command.
As Thereallo notes, the infrastructure is there, ready to go, and the JS API to enable it is referenced in the bundle. So while the app may not
necessarily be tracking you today, it has the potential to be activated at
any point in the future. What to read next The Trump administration is building a website to help Europeans evade content bans A developer found a Claude Code plugin collecting extensive telemetry across projects Russia's state-backed MAX app may know if you are using a VPN to bypass censorship
OneSignal is also used to collect profiling data on every user. Your
location, your notification interactions, your in-app message clicks, your phone number if you provide it, your tags, your state changes. All going to OneSignal's servers, Thereallo notes.
Additionally, the app also relies on code from a random GitHub account to embed YouTube videos. Thereallo points out that if this account is ever compromised, the perpetrator could serve arbitrary HTML and JavaScript to every user of this app.
The app also loads third-party code without adequate security infrastructure, sends your data to non-governmental infrastructure, and has no certificate pinning.
Is any of this illegal? Probably not. Is it what you'd expect from an
official government app? Probably not either, Thereallo concludes.
An app advertised as a one-stop-shop for news and media direct from the White House is instead functioning as a highly granular user profiling, tracking
and marketing tool. It is important to note that Thereallos analysis was conducted immediately after the apps release, and therefore features may have been modified, added or removed.
TechRadar Pro reached out to the White House for comment, but did not immediately receive a response. The best ID theft protection for all budgets Our top picks, based on real-world testing and comparisons
Read our full guide to the best identity theft protection 1. Best overall: Aura 2. Best for families: IdentityForce 3. Best for credit beginners: Experian IdentityWorks Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.
======================================================================
Link to news story:
https://www.techradar.com/pro/security/researcher-reveals-official-white-house -app-is-one-command-away-from-tracking-your-precise-location-every-4-5-minutes -app-can-also-inject-code-to-dodge-cookie-consent-gdpr-banners-and-paywalls
--- Mystic BBS v1.12 A49 (Linux/64)
* Origin: tqwNet Technology News (1337:1/100)