this post was submitted on 30 Mar 2026
63 points (100.0% liked)

Technology

42595 readers
371 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 4 years ago
MODERATORS
 

Call me crazy, but I don’t think an official government app should be loading executable code from a random person’s GitHub account. Or tracking your GPS location in the background. Or silently stripping privacy consent dialogs from every website you visit through its built-in browser. And yet here we are.

The White House released a new app last week for iOS and Android, promising “unparalleled access to the Trump Administration.” A security researcher, who goes by Thereallo, pulled the APKs and decompiled them — extracting the actual compiled code and examining what’s really going on under the hood. The propaganda stuff — cherry-picked news, a one-tap button to report your neighbors to ICE, a text that auto-populates “Greatest President Ever!” — which Engadget covered, is embarrassing enough. The code underneath is something else entirely.

Let’s start with the most alarming behavior. Every time you open a link in the app’s built-in browser, the app silently injects JavaScript and CSS into the page. Here’s what it does:

It hides: Cookie banners GDPR consent dialogs OneTrust popups Privacy banners Login walls Signup walls Upsell prompts Paywall elements CMP (Consent Management Platform) boxes

It forces body { overflow: auto !important } to re-enable scrolling on pages where consent dialogs lock the scroll. Then it sets up a MutationObserver to continuously nuke any consent elements that get dynamically added.

An official United States government app is injecting CSS and JavaScript into third-party websites to strip away their cookie consent dialogs, GDPR banners, login gates, and paywalls.

top 8 comments
sorted by: hot top controversial new old
[–] U7826391786239@piefed.zip 7 points 18 hours ago (4 children)

who the fuck would download this shit?

republicans are so fucking stupid

[–] calliope@piefed.blahaj.zone 6 points 18 hours ago (1 children)

Legitimately was going to say the same thing. Who would ever download this garbage?

The narcissism is embarrassing.

[–] U7826391786239@piefed.zip 5 points 18 hours ago

stone age tribalism pretending to be individualistic--you are a unique and special snowflakeBUTSNOWFLAKESAREBADDONTBEASNOWFLAKE

Give it a few months and your phone will helpfully install it for you.

[–] BananaIsABerry@lemmy.zip 1 points 14 hours ago

I downloaded it so I could rate it 1 star and then delete it.

[–] mrnobody@reddthat.com 1 points 16 hours ago

Oh it's not just Republicans, any bootlickers suffice! Or people who just don't follow politics the way many others do.

[–] Itsamelemmy@lemmy.zip 6 points 18 hours ago (1 children)
[–] HarkMahlberg@kbin.earth 3 points 16 hours ago

The author is way too generous offering their services to the Trump administration. The app is a massive security hole by design. This administration is not your standard business client, they are the attacker that you defend against.

If your ~~adversaries~~ buddies haven’t already done this analysis, they’re having a ~~slow~~ good week.