Get the latest tech news

We intercepted the White House app's network traffic


We set up a MITM proxy and captured the decrypted HTTPS traffic from the official White House iOS app. On a single browsing session it contacts multiple Elfsight domains, sends your device fingerprint to OneSignal, and loads Google DoubleClick ad tracking. The privacy manifest says it collects nothing.

None

Get the Android app

Or read this on Hacker News

Read more on:

Photo of White House

White House

Photo of traffic

traffic

Photo of requests

requests

Related news:

News photo

I traced my traffic through a home Tailscale exit node

News photo

I Decompiled the White House's New App

News photo

White House App Found Tracking Users' Exact Location Every 4.5 Minutes via Third-Party Server