reverse-engineering
-
2026-03-30
We Intercepted the White House App's Network Traffic. Here's What It Sends.
We set up a MITM proxy and captured the decrypted HTTPS traffic from the official White House iOS app. On a single browsing session it contacts multiple Elfsight domains, sends your device fingerprint to OneSignal, and loads Google DoubleClick ad tracking. The privacy manifest says it collects nothing.
-
2026-03-27
Security Analysis of the Official White House iOS App
We reverse engineered the official White House iOS app (gov.whitehouse.app) and found concerning security and privacy issues, including a Russian-origin company executing live JavaScript, a false privacy manifest, and minimal security hardening.