White House App Caught Secretly Tracking Users Every 4 Minutes

Researchers find official app sends location data to third parties every 4.5 minutes despite promises of direct government communication

Rex Freiberger Avatar
Rex Freiberger Avatar

By

Image: Google Play

Key Takeaways

Key Takeaways

  • White House app transmits 77% of network requests to third-party companies
  • GPS coordinates tracked every 4.5 minutes during active app usage
  • JavaScript code stripped cookie consent banners and bypassed GDPR protections

Seventy-seven percent of the official White House app‘s network requests flow to third-party companies, not the government. That jarring statistic emerged after cybersecurity researcher “Thereallo” decompiled the Android version, revealing privacy violations that would make even Facebook blush.

The app, launched March 28th as the Trump Administration’s direct line to supporters, promised “unparalleled access” to White House updates. Instead, it delivered unparalleled surveillance. Your precise GPS coordinates get transmitted to OneSignal servers every 4.5 minutes when active—dropping to 9.5 minutes when running in the background.

Your Phone Becomes a Tracking Device

Location data collection happens alongside comprehensive device fingerprinting.

OneSignal integration creates a digital fingerprint containing your IP address, timezone, phone model, carrier information, and session patterns. This data package gets shared on every app launch, building a detailed profile of usage habits. You’d expect this behavior from a sketchy gaming app, not official government software that handles citizen feedback.

Amateur Hour Development Exposed

Ohio-based contractor 45Press skipped basic mobile security practices entirely.

The app lacks code obfuscation, certificate pinning, or proper security hardening—making reverse engineering trivially easy. Even more concerning, the iOS version shipped with a completely blank privacy manifest, falsely suggesting zero data collection. Government contractors charging $1.4 million should understand App Store privacy requirements better than your nephew’s first coding project.

JavaScript Trickery Bypassed User Protections

Hidden code manipulated web content to strip away privacy safeguards.

Initial versions included JavaScript designed to hide cookie consent banners and circumvent GDPR paywalls on loaded web content. You click a news link expecting standard privacy protections, but the app actively defeats those mechanisms. This feature disappeared quickly after researchers exposed it, suggesting the White House knew it crossed secretive practices.

The administration scrambled to patch obvious violations after the decompilation went public—downgrading location permissions and removing the consent-stripping code. But reactive fixes can’t restore trust in government mobile apps that should meet higher security standards than consumer entertainment software. Your data deserves better protection, especially from the institutions claiming to serve you.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →